Siprnet Security Annual Refresher Training JKO

SIPRNET ANSWERS PRETEST
Which if the following methods is not authorized for destroying classified information
Overlaying


Cyber commands are large, capable, and powerful organizations, but our collective security really begins with what?
Your personal vigilance, attention, and adherence to our security standards and procedures


Who maintains the security clearance access roster for the command
The command security manager


You are authorized to share your token pin with other personnel since it's not a password
F

Annual siprnet security refresher training is conducted solely to eliminate minor security violations
F

What does siprnet stand for
Secret internet protocol network

What army regulation contains both the army policy for handling the unauthorised disclosure of classified information and other security incidents, and general guidance or "how to" for commanders?
AR 380-5

Which if the following statements are true concerning protecting classified information in the workplace
Work materials such as drafts and worksheets

If you are an officer, senior non commissioned officer, senior army civilian
False

What is the form number for the courier identification card that is used to identify personnel that are authorized to carry classified military information
DD-2501

WHY do we conduct siprnet annual training
all EXCEPT required by army/dod policy

What is the secret internet protocol router network?
A secure encrypted network authorized to process classified military information (CMI) up to, and including U.S. Secret

CMI is the acronym for categorized military information
F

Which of the following choices represent common SIPRNET-related security violations
All of the above

The person appointed to conduct the preliminary inquiry should not have been previously involved, directly or indirectly, in the incident and must have the appropriate security clearance.
T

Siprnet tokens contain three individual public key infrastructure certificates. The certificates are used for all of the following actions except what?
Gaining access through an entry control point

What is the data transfer across security domains known as?
Spillage

A siprnet user must have which of the following requirements prior to accessing the siprnet system?
All of the above

Siprnet removable hard drives may be stored in a fireproof, keyed file cabinet
F

The security of classified military information is not only a command responsibility of which of the following personnel?

Army leaders
Soldiers
DA Civilians/Contractors
All of the Above (correct)

Who maintains the security clearance access roster for the command?

The Command Security Manager (correct)

Which of the following actions are prohibited by Army Regulation 25-2, Information Assurance? [Remediation Accessed :N]

Storing and or using cellular telephones or other wireless devices where classified process takes place (correct)

If you are an officer, senior noncommissioned officer, senior Army civilian, or senior foreign national, it is possible that you may be appointed to conduct a preliminary inquiry of possible loss or compromise of classified information. [Remediation Accessed :N]

False (correct)

Why do we conduct SIPRNET annual training? Choose each applicable answer.

There are real and growing threats to the Army MEDCOM in the cyber domain conflict. (correct)
We desire to eliminate and minimize minor security violations within MEDCOM. (correct)
We are required to do so by MEDCOM policy. (correct)

The Cyber Commands are large, capable, and powerful organizations, but our collective security really begins with what?

Your personal vigilance, attention, and adherence to our security standards and procedures (correct)

SIPRNET token contain three individual public key infrastructure certificates. These certificates are used for all of the following actions EXCEPT what?

Gaining access through an entry control point (correct)

SIPRNET removable hard drives may be stored in a fireproof, keyed file cabinet.

False (correct)

The local information Assurance Support Officer is responsible for which of the following actions?

All of the above (correct)

Which of the following statements are true concerning information storage requirements? [Remediation Accessed :N]

A GSA approved security container is authorized for storage of Secret documents. (correct)

A member of the operations office has been handed a Secret document that he needs for his work. What is he responsible for as a custodian of that document? [Remediation Accessed :N]

Ensuring that the document is locked in a GSA approved security container whenever it is not in use or under the direct supervision of an authorized person. (correct)

When an incident of possible loss or compromise of classified information is reported, who does Army policy require to immediately initiate a preliminary inquiry with the focus on answering when, where, and how did the incident occur?

The Commander (correct)

Because we use "Secret" level encryption devices and keys, the SIPRNET is completely and totally secure and can be used to transmit the most secure and sensitive information that we have in the Army and Department of Defense.

False (correct)

The purpose of this annual SIPRNET refresher training is to ensure that all MEDCOM SIPRNET users are aware of their responsibilities for the protection of classified data and systems in accordance with applicable Army regulations and MEDCOM policy on SIPRNET Security Procedures.

True (correct)

Which of the following statements concerning the hand-carrying of classified material is NOT correct? [Remediation Accessed :N]

The classified materials can be read or studied in public, however, the proper cover sheet (SF-703, 704 or 705) must be used. (correct)

Which of the following choices is NOT one of the four distinct areas of potential threat against MEDCOM and the MEDCOM SIPRNET communications backbone? [Remediation Accessed :N]

Official correspondences between MEDCOM and other authorized entities for official government business. (correct)

SIPRNET token PINS can consist of both numbers and letters.

False (correct)

Which of the following choices represent common SIPRNET-related security violations?

Not being able to correctly identify mismarked classified information or products.
Not understanding the requirements of or how to transmit classified information using facsimile or scanner.
Mistakenly sending classified documents or information via unclassified means or through the NIPRNET.
Using unauthorized external storage media devices such as thumb drives, flash drives, memory sticks and other portable and removable storage media.
All of the above. (correct)

Top Secret operational and intelligence communications are integrated into what communications backbone? [Remediation Accessed :N]

JWICS (correct)

What Army regulation contains both the Army policy for handling the unauthorized disclosure of classification document and other security incidents, and general guidance or "how to" for commanders?

AR 380-5, Department of the Army Information Security Program (correct)

Which of the following are required markings on all classified documents?

All of the above

Classified information is official government information that has been determined to require protection against unauthorized disclosure in the interest of National Security.

Confidential, Secret, Top Secret

When transporting SCI within the building (Outside the SCIF), the material shall be placed in a brief case or locked pouch made of canvas or other heavy duty material and must have an integral key operated lock

True

Specific material must be used for derivative classification decisions.

Contract security specification
Security classification guides
Properly marked source documents

A security incident in which classified data is introduced to an information system with a lower level of classification or to a system not accredited to process data of that restrictive category is an example of which type of security incident?

Data Spill

You may be subject to loss or denial of classified access, suspension without pay, termination of employment, discharge from military service, and criminal prosecution if you knowingly, willfully, or negligently disclose classified information or CUI to unauthorized persons.

True

Aggregating unclassified information together will never make the information classified.

False

If you hold a top secret clearance, you are required to report to the security office when you have a foreign roommate over 30 calendar days, a co-habitant, and when you get married.

True

You do not have to report unofficial foreign travel to the security office

False

After securing your space at the end of the day, you should try to badge back in to ensure it is locked.

True

Which of the following is NOT a controlled unclassified information marking?

For Official Use Only

SCI material can be processed on SIPRNET if the content is Secret/SCI

False

Wireless wearable fitness devices are authorized within SCIFs

False

Controlled unclassified information (CUI) requires the following markings: banner lines, portion markings, and a CUI designation indicator.

True

The full receiving and return address, including names, along with the highest classification level and dissemination markings are required to be on the outer layer of classified documents double wrapped for mailing.

False

1) Which of the following are required markings on all classified documents?

All of the above

Classified information is official government information that has been determined to require protection against unauthorized disclosure in the interest of National Security. Which of the following are levels of classified information? Select all that apply

- Top Secret
- Confidential
- Secret

When transporting SCI within the building (outside the SCIF), the material shall be placed in a locked brief case or locked pouch made of canvas or other heavy-duty material and must have an integral key-operated lock.

TRUE

Specific material must be used for derivative classification decisions. Which of the following are authorized sources? Select all that apply.

- Security classification guides
- Properly marked source documents
-Contract Security Classification Specifications

A security incident in which classified data is introduced to an information system with a lower level of classification, or to a system not accredited to process data of that restrictive category is an example of which type of security incident?

Data Spill

You may be subject to loss or denial of classified access, suspension without pay, termination of employment, discharge from military service, and criminal prosecution if you knowingly, willfully, or negligently disclose classified information or CUI to unauthorized persons.

True

Aggregating unclassified information together will never make the information classified

False

If you hold a top secret clearance, you are required to report to the security office when you have a foreign roommate over 30 calendar days, a co-habitant, and when you get married.

True

You do not have to report unofficial foreign travel to the Security Office.

False

After securing your space at the end of the day, you should try to badge back in to ensure it is locked.

True

Which of the following is not a controlled unclassified information marking?

For Official Use Only

SCI material can be processed on SIPRNET if the content is SECRET//SCI

False

Wireless Wearable Fitness Devices are authorized within SCIFs.

False

Controlled unclassified information (CUI) requires the following markings: banner lines, portion markings, and a CUI designation indicator.

True

The full receiving and return address, including names, along with the highest classification level and dissemination markings are required to be on the outer layer of classified documents double wrapped for mailing.

False

classified information can be safeguarded by using________. (select all that apply)

Vaults, Secure Rooms, Secure Telephones

A security infraction involves loss, compromise, or suspected compromise.

False

What form is used to record end-of-day security checks?

SF 701

Which of the following is required to access classified information? )select all that apply)

NEEDS REVIEW

Physical security is concerned with_____and ____ measures designed to prevent unauthorized access.

needs review

what form is used to request a background investigation

SF86

which of the following are parts of the opsec process

OPSEC process involves five steps: (1) identification of critical information, (2) analysis of threats, (3) analysis of vulnerabilities, (4) assessment of risk, and (5) application of appropriate

a security infraction involves loss compromise or suspected compromise

false

the personnel security program establishes______ for personnel security determinations and overall program management responsibilities

Policies and procedures

which method may be used to transmit confidential materials to dod agencies

First Class mail

derivative classifiers are required to have all the following except

Approval of the original classification authority (OCA)

top secret documents can be transmitted by which of the following methods

Defense Courier Service, Secure Fax

which of the following materials are subject to pre-publication review

articles, speeches, books

which of the following is required to access classified information

sf312, clearance eligibility at the appropriate level, need to know

which level of classified information could cause damage to national security

confidential

physical security is concerned with______ and _______ measures designed to prevent unauthorized access

active, passive

The security of classified military information is not only a command responsibility of which of the following personnel?

Army leaders
Soldiers
DA Civilians/Contractors
All of the Above (correct)

Who maintains the security clearance access roster for the command?

The Command Security Manager (correct)

Which of the following actions are prohibited by Army Regulation 25-2, Information Assurance? [Remediation Accessed :N]

Storing and or using cellular telephones or other wireless devices where classified process takes place (correct)

If you are an officer, senior noncommissioned officer, senior Army civilian, or senior foreign national, it is possible that you may be appointed to conduct a preliminary inquiry of possible loss or compromise of classified information. [Remediation Accessed :N]

False (correct)

Why do we conduct SIPRNET annual training? Choose each applicable answer.

There are real and growing threats to the Army MEDCOM in the cyber domain conflict. (correct)
We desire to eliminate and minimize minor security violations within MEDCOM. (correct)
We are required to do so by MEDCOM policy. (correct)

The Cyber Commands are large, capable, and powerful organizations, but our collective security really begins with what?

Your personal vigilance, attention, and adherence to our security standards and procedures (correct)

SIPRNET token contain three individual public key infrastructure certificates. These certificates are used for all of the following actions EXCEPT what?

Gaining access through an entry control point (correct)

SIPRNET removable hard drives may be stored in a fireproof, keyed file cabinet.

False (correct)

The local information Assurance Support Officer is responsible for which of the following actions?

All of the above (correct)

Which of the following statements are true concerning information storage requirements? [Remediation Accessed :N]

A GSA approved security container is authorized for storage of Secret documents. (correct)

A member of the operations office has been handed a Secret document that he needs for his work. What is he responsible for as a custodian of that document? [Remediation Accessed :N]

Ensuring that the document is locked in a GSA approved security container whenever it is not in use or under the direct supervision of an authorized person. (correct)

When an incident of possible loss or compromise of classified information is reported, who does Army policy require to immediately initiate a preliminary inquiry with the focus on answering when, where, and how did the incident occur?

The Commander (correct)

Because we use "Secret" level encryption devices and keys, the SIPRNET is completely and totally secure and can be used to transmit the most secure and sensitive information that we have in the Army and Department of Defense.

False (correct)

The purpose of this annual SIPRNET refresher training is to ensure that all MEDCOM SIPRNET users are aware of their responsibilities for the protection of classified data and systems in accordance with applicable Army regulations and MEDCOM policy on SIPRNET Security Procedures.

True (correct)

Which of the following statements concerning the hand-carrying of classified material is NOT correct? [Remediation Accessed :N]

The classified materials can be read or studied in public, however, the proper cover sheet (SF-703, 704 or 705) must be used. (correct)

Which of the following choices is NOT one of the four distinct areas of potential threat against MEDCOM and the MEDCOM SIPRNET communications backbone? [Remediation Accessed :N]

Official correspondences between MEDCOM and other authorized entities for official government business. (correct)

SIPRNET token PINS can consist of both numbers and letters.

False (correct)

Which of the following choices represent common SIPRNET-related security violations?

Not being able to correctly identify mismarked classified information or products.
Not understanding the requirements of or how to transmit classified information using facsimile or scanner.
Mistakenly sending classified documents or information via unclassified means or through the NIPRNET.
Using unauthorized external storage media devices such as thumb drives, flash drives, memory sticks and other portable and removable storage media.
All of the above. (correct)

Top Secret operational and intelligence communications are integrated into what communications backbone? [Remediation Accessed :N]

JWICS (correct)

What Army regulation contains both the Army policy for handling the unauthorized disclosure of classification document and other security incidents, and general guidance or "how to" for commanders?

AR 380-5, Department of the Army Information Security Program (correct)

Which of the following are required markings on all classified documents?

All of the above

Classified information is official government information that has been determined to require protection against unauthorized disclosure in the interest of National Security.

Confidential, Secret, Top Secret

When transporting SCI within the building (Outside the SCIF), the material shall be placed in a brief case or locked pouch made of canvas or other heavy duty material and must have an integral key operated lock

True

Specific material must be used for derivative classification decisions.

Contract security specification
Security classification guides
Properly marked source documents

A security incident in which classified data is introduced to an information system with a lower level of classification or to a system not accredited to process data of that restrictive category is an example of which type of security incident?

Data Spill

You may be subject to loss or denial of classified access, suspension without pay, termination of employment, discharge from military service, and criminal prosecution if you knowingly, willfully, or negligently disclose classified information or CUI to unauthorized persons.

True

Aggregating unclassified information together will never make the information classified.

False

If you hold a top secret clearance, you are required to report to the security office when you have a foreign roommate over 30 calendar days, a co-habitant, and when you get married.

True

You do not have to report unofficial foreign travel to the security office

False

After securing your space at the end of the day, you should try to badge back in to ensure it is locked.

True

Which of the following is NOT a controlled unclassified information marking?

For Official Use Only

SCI material can be processed on SIPRNET if the content is Secret/SCI

False

Wireless wearable fitness devices are authorized within SCIFs

False

Controlled unclassified information (CUI) requires the following markings: banner lines, portion markings, and a CUI designation indicator.

True

The full receiving and return address, including names, along with the highest classification level and dissemination markings are required to be on the outer layer of classified documents double wrapped for mailing.

False