Sociology > QUESTIONS & ANSWERS > Annual Security and Counterintelligence Awareness 2022 with complete solution. Rated A+, (All)
Annual Security and Counterintelligence Awareness 2022 with complete solution When transporting classified information, the courier must have a DD Form 2501, and as a minimum use a locked briefcase... or zippered pouch made of canvas or other heavy duty material? -Answer- True What are the three classification levels of information? -Answer- 1. Confidential.. 2. Secret. 3. Top Secret. What is the purpose of the SF 701 "Activity Security Checklist" and the SF 702 "Security Container Check Sheet?" -Answer- They are used as part of the end-of-day security checks activities that process or store classified material. If you find classified material out of proper control you should take custody of the material and safeguard it, if possible, and immediately notify your security representative or supervisor? -Answer- True. In the event of a natural disaster, which of the following statements is true concerning an emergency action procedure for classified material? -Answer- The first priority is protection of life, followed by the protection of classified material. Using curbside mailboxes is an approved method for mailing classified information? - Answer- False. Which of the following statement below are true concerning security containers, vaults, or open storage areas? Select all that apply. -Answer- 1. The combination must be protected at the same level as the highest classification of the material authorized for storage. 2. Do not store items such as weapons, money, jewelry, precious metals or drugs in the same container as classified material. Which of the following are approved methods of discussing and transmitting classified material? Select all that apply. -Answer- 1. SIPRnet. 2. Secure Fax. 3. Secure Telephone. Which of the following methods are routinely used for destroying classified information? Select all that apply. -Answer- 1. Burning.2. Approved cross-cut shredding. 3. Wet-pulping. Which of the following statements below must be on the front of a GSA-approved security container for storing classified information? -Answer- "General Services Administration-Approved Security Container" Personnel who fail to report CI Activities of concern as outlines in Enclosure 4 of DoD Directive 5240.06 are subject to appropriate disciplinary action under regulations - Answer- True. Cyber Vulnerabilities to DoD Systems may include: -Answer- All the above. DoD personnel who suspect a coworker of possible espionage should: -Answer- Report directly to your CI or Security Office. Under DoD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators and Behaviors; which of the following is not reportable? -Answer- None of the above. Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that 'may be indicative' of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity as a writing espionage agent. Examples of PEI include: -Answer- All of the above. Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as "any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The term includes foreign intelligence and security services and international terrorists." - Answer- True. Counterintelligence as defined in the National Security Act of 1947, is "information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations or foreign persons, or international terrorist activities." -Answer- True. If you feel you are being solicited for information which of the following should you do? - Answer- All of the above. Foreign Intelligence Entities seldom use the Internet or other communications including social networking services as a collection method? -Answer- False.Foreign Intelligence Entities seldom use elicitation to extract information from people who have access to classified or sensitive information? -Answer- False. Collection Methods or operation frequently used by Foreign Intelligence Entities to collect information from DoD on the critical technology being produced within the cleared defense contractor facilities we support include: -Answer- All the above. Which of the following is not an example of an anomaly? -Answer- Foreign diplomat attempts to defect.. Which of the following statements are correct concerning why a person would need to obtain a security clearance? Select all that apply. -Answer- 1. To ensure trustworthy people have access to classified information. 2. To ensure only trustworthy people hold national security sensitive positions. All DoD civilian positions are categorized into which following security groups? -AnswerSpecial Sensitive, Critical Sensitive, Non-Critical Sensitive, and Non-Sensitive. Which of the following procedures is used to monitor personnel for new information or changes that could affect their eligibility to hold a security clearance or fill a sensitive position? -Answer- Continuous evaluation. Which of the following organizations is the sole authority for determining the clearance eligibility for non-intelligence agency DoD? -Answer- Department of Defense Consolidated Adjudications Facility (DoD CAF) Which of the following are part of the 13 national security adjudicators use to determine your eligibility for a clearance? Select all that apply. -Answer- 1. Personal conduct. 2. Criminal conduct. 3. Allegiance to the United States. When a security clearance is denied or revoked, the decision is final? -Answer- False. Which of the following are you expected to do when you hold a secret clearance, of fill a national security sensitive position? Select all that apply. -Answer- 1. Comply with the high standards of conduct required of persons having access to classified information or performing [Show More]
Last updated: 2 years ago
Preview 1 out of 6 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Sep 20, 2022
Number of pages
6
Written in
This document has been written for:
Uploaded
Sep 20, 2022
Downloads
0
Views
116
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·