Sociology > QUESTIONS & ANSWERS > Annual Security and Counterintelligence Awareness 2022 with complete solution. Rated A+, (All)

Annual Security and Counterintelligence Awareness 2022 with complete solution. Rated A+,

Document Content and Description Below

Annual Security and Counterintelligence Awareness 2022 with complete solution When transporting classified information, the courier must have a DD Form 2501, and as a minimum use a locked briefcase... or zippered pouch made of canvas or other heavy duty material? -Answer- True What are the three classification levels of information? -Answer- 1. Confidential.. 2. Secret. 3. Top Secret. What is the purpose of the SF 701 "Activity Security Checklist" and the SF 702 "Security Container Check Sheet?" -Answer- They are used as part of the end-of-day security checks activities that process or store classified material. If you find classified material out of proper control you should take custody of the material and safeguard it, if possible, and immediately notify your security representative or supervisor? -Answer- True. In the event of a natural disaster, which of the following statements is true concerning an emergency action procedure for classified material? -Answer- The first priority is protection of life, followed by the protection of classified material. Using curbside mailboxes is an approved method for mailing classified information? - Answer- False. Which of the following statement below are true concerning security containers, vaults, or open storage areas? Select all that apply. -Answer- 1. The combination must be protected at the same level as the highest classification of the material authorized for storage. 2. Do not store items such as weapons, money, jewelry, precious metals or drugs in the same container as classified material. Which of the following are approved methods of discussing and transmitting classified material? Select all that apply. -Answer- 1. SIPRnet. 2. Secure Fax. 3. Secure Telephone. Which of the following methods are routinely used for destroying classified information? Select all that apply. -Answer- 1. Burning.2. Approved cross-cut shredding. 3. Wet-pulping. Which of the following statements below must be on the front of a GSA-approved security container for storing classified information? -Answer- "General Services Administration-Approved Security Container" Personnel who fail to report CI Activities of concern as outlines in Enclosure 4 of DoD Directive 5240.06 are subject to appropriate disciplinary action under regulations - Answer- True. Cyber Vulnerabilities to DoD Systems may include: -Answer- All the above. DoD personnel who suspect a coworker of possible espionage should: -Answer- Report directly to your CI or Security Office. Under DoD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators and Behaviors; which of the following is not reportable? -Answer- None of the above. Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that 'may be indicative' of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity as a writing espionage agent. Examples of PEI include: -Answer- All of the above. Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as "any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The term includes foreign intelligence and security services and international terrorists." - Answer- True. Counterintelligence as defined in the National Security Act of 1947, is "information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations or foreign persons, or international terrorist activities." -Answer- True. If you feel you are being solicited for information which of the following should you do? - Answer- All of the above. Foreign Intelligence Entities seldom use the Internet or other communications including social networking services as a collection method? -Answer- False.Foreign Intelligence Entities seldom use elicitation to extract information from people who have access to classified or sensitive information? -Answer- False. Collection Methods or operation frequently used by Foreign Intelligence Entities to collect information from DoD on the critical technology being produced within the cleared defense contractor facilities we support include: -Answer- All the above. Which of the following is not an example of an anomaly? -Answer- Foreign diplomat attempts to defect.. Which of the following statements are correct concerning why a person would need to obtain a security clearance? Select all that apply. -Answer- 1. To ensure trustworthy people have access to classified information. 2. To ensure only trustworthy people hold national security sensitive positions. All DoD civilian positions are categorized into which following security groups? -AnswerSpecial Sensitive, Critical Sensitive, Non-Critical Sensitive, and Non-Sensitive. Which of the following procedures is used to monitor personnel for new information or changes that could affect their eligibility to hold a security clearance or fill a sensitive position? -Answer- Continuous evaluation. Which of the following organizations is the sole authority for determining the clearance eligibility for non-intelligence agency DoD? -Answer- Department of Defense Consolidated Adjudications Facility (DoD CAF) Which of the following are part of the 13 national security adjudicators use to determine your eligibility for a clearance? Select all that apply. -Answer- 1. Personal conduct. 2. Criminal conduct. 3. Allegiance to the United States. When a security clearance is denied or revoked, the decision is final? -Answer- False. Which of the following are you expected to do when you hold a secret clearance, of fill a national security sensitive position? Select all that apply. -Answer- 1. Comply with the high standards of conduct required of persons having access to classified information or performing [Show More]

Last updated: 2 years ago

Preview 1 out of 6 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$8.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

116
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 20, 2022

Number of pages

6

Written in

Seller


seller-icon
bundleHub Solution guider

Member since 3 years

355 Documents Sold

Reviews Received
27
21
9
0
9
Additional information

This document has been written for:

Uploaded

Sep 20, 2022

Downloads

 0

Views

 116

Document Keyword Tags

More From bundleHub Solution guider

View all bundleHub Solution guider's documents »

$8.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·