TBS Phase 1 exam| 685 Questions| With Complete Solutions
2 views 0 purchase
Course
TBS
Institution
TBS
define Operational Security (OPSEC), correct answer: The process to deny the enemy critical information about us.
identify immediate actions for safeguarding suspected classified material correct answer: Report all security violations or suspected compromises, including espionage attempts, to ...
TBS Phase 1 exam| 685 Questions| With
Complete Solutions
define Operational Security (OPSEC), correct answer: The process to deny the enemy critical information about us.
identify immediate actions for safeguarding suspected classified material correct answer: Report all security violations or suspected compromises, including espionage attempts, to the security manager immediately.
identify the levels of classified materials security classification correct answer: 1. Top Secret - 2. Secret
3. Confidential - - 4. Unclassified -
top secret correct answer: - unauthorized disclosure can be expected to cause exceptionally grave damage to national security. Orange cards
Secret correct answer: unauthorized disclosure could be expected to cause serious damage to national security. Red card indicator Confidential correct answer: - could be expected to cause identifiable damage to national security- blue cards
Unclassified correct answer: any other material not marked
identify procedures for classified material spillage or compromise correct answer: Report all security violations or suspected compromises, including espionage attempts, to the security manager immediately. Use classified material in a controlled environment that limits the number of people who have access to it. Cover or close material if uncleared personnel approach. Never leave classified material unsecured. Never take classified material home. Memorize safe combinations; written records of combinations are only maintained in the CMCC and may not be held by any individual. Store nothing valuable with classified material. Do not discuss classified material with anyone other than cleared personnel with need to know. Destroy material exactly when told using the prescribed method.
identify the procedures for reporting persons suspected of espionage correct answer: report the incident or person immediately to your chain of command, security manager, S-2 Intelligence Officer, or Naval Criminal Investigative Services (NCIS identify the methods used by foreign agents to collect information correct answer: 1. Exploiting or stealing classified equipment and technology
2. Illegally transferring U.S. technology from third countries
3. Covert espionage.
4. Recruitment of Americans to a foreign cause or the exploitation of human intelligence.
5. Cyber attacks
identify procedures for handling of "For Official Use Only" materials correct answer: identify ways to safeguard personally identifiable information (PII) in correct answer: 1. Ensuring that PI/PII contained in a system of records, , is protected so that the security and confidentiality of the information is preserved.
2. Not disclosing any information contained in a system of records
3. Not maintaining unpublished official files.
4. Safeguarding the privacy of individuals and confidentiality of PI/PII contained in a system of records. 5. Properly marking all FOR OFFICIAL USE ONLY - PRIVACY SENSITIVE - Any misuse or unauthorized disclosure can result in both civil and criminal penalties." 6. Not maintaining privacy sensitive information in public folders.
7. Reporting any unauthorized disclosure of PI/PII f
.
8. DON activities shall not maintain records describing how an individual exercises his/her rights guaranteed by the First Amendment
define personally identifiable information (PII correct answer: Any information or characteristics that may be used to distinguish or trace an individual's identity, such as their name, social security number, or biometric records. PII falls under the sub-classification For Official Use Only (FOUO).
Communications
Security (COMSEC correct answer: Measures and controls taken to deny unauthorized persons information derived from telecommunications systems and ensure authenticity of such communications
Classified Information correct answer: Official information which has been determined to require, in the interests of national
security, protection against unauthorized disclosure and which has been so identified by the assignment of a security classification
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.99. You're not tied to anything after your purchase.