Term
|
Definition
Orange - grave damage 5 years SSBI, PPR |
|
|
Term
|
Definition
Red- serious damage every 10 and 15 years NACLC, ANACI |
|
|
Term
|
Definition
Blue- Damage every 10 and 15 years |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Security Access Eligibility Report Used when getting SCI clearance but have to explain something in detail (something negative comes up) |
|
|
Term
Who has overall authority of and controls access to a SCIF? |
|
Definition
|
|
Term
|
Definition
Security container information |
|
|
Term
|
Definition
Activity security checklist |
|
|
Term
|
Definition
Security container checksheet |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Classified information nondisclosure agreement |
|
|
Term
State when safe combinations should be changed |
|
Definition
atleast annually, if combination is compromised, if individual with combination transfers |
|
|
Term
|
Definition
Foreign disclosure office approve disclosure of classified/unclassified military information to foreign representatives |
|
|
Term
|
Definition
Defense Courier Service national network of couriers/stations for secure transmission of classified documents and material |
|
|
Term
Describe the procedures for transportation via DCS |
|
Definition
<300 lb, minimum of flat envelope |
|
|
Term
Describe the procedures for handcarry |
|
Definition
classified material coversheet, double wrap information, CO must authorize, Accomplished by US carrier, advance arrangements must be made |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
incident has occured threat is imminent |
|
|
Term
|
Definition
|
|
Term
|
Definition
emergency action plan to safeguard comsec in the event of an emergency |
|
|
Term
Emergency destuction procedure |
|
Definition
precautionary and complete destruction (only CO can authorize) |
|
|
Term
explain how and in what order material is destroyed during emergency destruction |
|
Definition
1. superceded keying material and secondary variables 2. top secret primary keying material 3. secret, confidential, unclassified keying material 4. future keying material 5. non essential classified manuals 6. maintenance manuals 7. operating manuals 8. administrative manuals |
|
|
Term
define the difference between a security violation and a practice dangerous to security |
|
Definition
Violation- compromise of classified info to person not authorized and requires an investigation PDS-Potential to jeopardize security (reportable/non reportable) |
|
|
Term
Discuss the need for access lists, required documentation log, and two-person integrity |
|
Definition
access list-verified people authorized access to classified material RDL- account for personnel actions TPI- 2 people to deal with restricted access or sensitive material |
|
|
Term
|
Definition
|
|
Term
Identify who can be an CSM |
|
Definition
command security manager officer or civillian employee GS-11 or above US Citizen |
|
|
Term
State the duties and responsibilities of a CSM |
|
Definition
-implementing information security program -principle advisor to CO regarding classification -develop command security instruction -formulate security education program |
|
|
Term
Discuss how long a CO can administratively suspend access before DONCAF revokes a clearance |
|
Definition
must be reported no later then 10 days from the date of suspension |
|
|
Term
explain why the namy uses .mil email addresses on government systems |
|
Definition
US DOD has exclusive use of this domain |
|
|