Sensitive Compartmented Information (SCI) Security Refresher

A security violation involves the loss, compromise, or suspected compromise of classified information. Security violations must be reported.

true

You are required to report all foreign travel prior to departure, including day trips to Canada and Mexico.

false

When you signed the SCI NdS, you agreed that anything you gained from unauthorized disclosure of SCI would become the property of the United States Government.

true

Walls in SCIFs must extend from true floor to true ceiling.

true

An SCI document that contains the dissemination control marking NOFORN indicates this document ___________________________________.

a. Is not releasable to foreign nationals

You must report external activist groups you or your co-workers are affiliated with regardless of their nature.

true

Visitors may enter a SCIF without a visitor certification if they are escorted by indoctrinated personnel.

true

If the ISSO permits it, you may share your password in a SCIF.

false

The access control system for unattended SCIF entry must use ____________________ and _______________________ such as an access card and personal identification number (PIN).

b. Authentication, verification

SCI couriers must be appointed __________, have a signed letter of authorization and know the rules and regulations governing couriers and transporting classified material.

in writing

In a SCIF, SCI must always be stored in a GSA-approved container.

false

After setting the alarm on a SCIF, spinning the lock, and displaying the closed sign, you must complete the _____________________ form

b. SF-701 NOT correct

Which is the primary database used to verify personnel access to SCIFs outside DoD?

b. Joint Personnel Adjudication System (JPAS) NOT CORRECT

If a SCIF has a high security lock, then an access control system is not required.

false

The SCI control system marking should not be listed in the banner line on a classified document.

false

_____________ is technically derived intelligence data other than imagery and signals intelligence that locates, identifies, or describes distinctive characteristics of targets.

f. Measurement and Signature Intelligence (MASINT)

What piece of information is not required to be recorded on the SCIF visitor control log?

f. Visitor's date of birth

The three primary types of SCIFs are referred to as closed storage SCIF, open storage SCIF, and ___________________.

a. Continuous Operation SCIF

You must report any systemic weaknesses and anomalies.

true

When closing a closed storage SCIF you must ensure all classified material has been stored, security containers are closed and locked, locked sign is displayed on security containers, and the SF-701 form is completed.

true

SCI is required to be stored in a GSA-approved container in a Closed Storage SCIF.

true

One company must be responsible for the installation, maintenance, and monitoring of the Intrusion Detection System (IDS) for SCIFs.

true

SCI Material cannot be stored in _________________________________.

b. An open storage SCIF (WRONG)

_____________ uses imagery, imagery intelligence, or geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the earth.

b. Imagery Intelligence (IMINT) (WRONG)

Which of the following is the preferred method for transporting an SCI document from one SCIF to another?

a. Defense Courier Service (DCS)

IS components, media, and/or memory may be brought into a SCIF and removed from a SCIF if it has been properly logged and approved by the __________________________.

c. Special Security Officer (SSO) or Information Systems Security Officer (ISSO)

Which of the following is an escort in a SCIF not required to do?

d. Process the visitor certifications for their visitors

You've noticed that Sydney has been very unhappy and disgruntled at work lately in the SCIF. You are required to report this information about Sydney.

true

How long must SCIF visitor control logs be retained?

. 1 year after the last entry

Sensitive Compartmented Information (SCI) is ______________________.

c. Classified national intelligence information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems

You are not required to report adverse information about others who also have SCI access. You are only required to report adverse information about yourself.

false

The ___________________________ processes SCIF visitor certifications.

b. Special Security Officer (SSO) or Special Security Representative (SSR)

_____________ includes representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media which is derived from visual photography, radar sensors, and electro-optics.

c. Imagery Intelligence (IMINT)

SCI material is not required to be stored in a GSA-approved container in an open storage SCIF.

true

Which SCI control system is designed to protect imagery intelligence?

a. TALENT KEYHOLE (TK)

When you signed the _______________, you acknowledged that you were advised that mishandling SCI could cause irreparable harm to the United States and you are obligated not to disclose SCI to anyone who is not authorized to receive it.

a. SCI NdS

Current SCI control systems are HCS, SI, and ________________.

a. TALENT KEYHOLE

A French citizen you met at a party has taken a strong interest in finding out more about your employment. Because you do not return his phone calls, however, this is not considered a foreign contact that must be reported.

false

Who provides construction and security requirements for SCIFs?

a. Defense Intelligence Agency (DIA) WRONG

Who is responsible for terminating SCI access?

. Special Security Officer (SSO), or designee WRONG

_____________ is the collection of intelligence through public sources.

a. Open Source Intelligence (OSINT)

Who heads the Intelligence Community (IC)?

c. Director of National Intelligence

You must consult your SCIF's ____________to learn what you are or are not permitted to tell your family members about your work location and mission.

b. ISSO WRONG

SCI control systems are additional measures used to protect intelligence sources and methods or analytical procedures that are beyond those used to protect non-SCI classified information.

true

When you sign the SCI Nondisclosure Statement (NdS), you are ________________________.

b. Making a lifelong commitment to protect U. S. Government classified intelligence information

You should never connect classified and unclassified systems together.

true

Equipment used to destroy SCI paper materials must be listed in the ___________________________________________________________.

c. NSA Evaluated Products List of High Security Crosscut Paper Shredders

You are required to remove your name badge as soon as you leave your SCIF so as not to call attention to yourself.

true

When you signed the SCI NdS, you acknowledged that this agreement will last until you retire or separate from the Federal Government, unless you are released in writing by an authorized representative of the department or agency that last granted you with access to SCI.

false

Walls within a SCIF require acoustical protection measures and sound masking systems to protect SCI.

true

SCIF windows must be secured at ground level and up to _____________ above ground level.

18 feet

In a SCIF, SCI must always be stored in a GSA-approved container.

false

You are permitted to discuss SCI outside your SCIF as long as it is with one of your SCIF co-workers.

false

For access to SCIFs during business hours, cipher locks may be used for high security areas and compartments.

true

SCI is required to be stored in a GSA-approved container in a Closed Storage SCIF.

true

SCI Material cannot be stored in _________________________________.

c. An open storage SCIF (WRONG)

SCI material must be _____________________ prior to giving the package to the courier.

double wrapped

Which of the following is true about escorts in SCIFs

c. Only personnel assigned to the SCIF are authorized to escort non-indoctrinated or contractor personnel within the government area.

In a SCIF, reproduction equipment must display a sign indicating the highest level of classification allowed to be reproduced on that equipment

true

You placed a For Sale ad in the local newspaper in an attempt to sell your old car. Because this involves contact with the media, you are required to report it.

false

Equipment leaving latent images on itself or on other material or that has the capability to connect to remote diagnostic centers, such as by telephone line, is prohibited for classified reproduction.

true

____________ is the collection of intelligence through public sources.

a. Human Intelligence (HUMINT) (WRONG)

Visitors who are not certified may access classified information as long as their affiliation or position warrants it.

false

Copies of classified documents are not subject to the same control, accountability, and destruction procedures as the original document.

false

You are required to have a pre-publication review of any material you create based on your access to classified information before it enters _______________.

b. The public domain

The SCIF Fixed Facility Checklist is used to obtain SCIF accreditation.

true

_____________ is technically derived intelligence data other than imagery and signals intelligence that locates, identifies, or describes distinctive characteristics of targets.

c. Measurement and Signature Intelligence (MASINT)

When you signed the SCI NdS, you gave up protection under the Whistleblower Protection Act

false

You should never connect classified and unclassified systems together.

true

We use classification management to determine the nature of information and assign proper classification markings, SCI control system markings, dissemination controls, and declassification instructions.

true

Security violations are required to be reported, but infractions are not required to be reported.

false

Christopher works in a SCIF and is having an Internet relationship in a chat room (outside of work hours) with a woman who is not a U.S. citizen. Christopher is required to report this relationship.

true

What piece of information is not required to be recorded on the SCIF visitor control log?

visitors birth date

_____________ is the collection of intelligence using human sources such as diplomats, military attaches, and spies.

b. Open Source Intelligence (OSINT)

_____________ is the collection of verbal and nonverbal signals from land, sea, and satellite. These signals are protected within the Communications Intelligence, (COMINT) SCI control system.

. Geospatial Intelligence (GEOINT) (WRONG)

Equipment used to destroy SCI paper materials must be listed in the ___________________________________________________________.

b. NSA Evaluated Products List of High Security Crosscut Paper Shredders

Destruction of SCI must be conducted by SCI indoctrinated personnel.

true

Which SCI control system is designed to protect signals intelligence including communications intelligence and electronic intelligence?

c. HCS (HCS) (wrong)

You must report any systemic weaknesses and anomalies.

True

Which of the following statements is correct?

c. You must report any part-time employment (WRONG)

The DNI issued several _________________ and ________________ which provide security policy for the protection of national intelligence as well as the personnel security requirements for access to SCI, and physical and technical security requirements for SCIFs.

c. Intelligence Community Directives, Intelligence Community Policy Guidance documents

Jill works in a SCIF. Jill is party to a malpractice lawsuit. Jill is required to report this legal involvement.

True

Spills are deliberate unauthorized disclosures of classified information to the media whereas leaks are accidental or intentional unauthorized disclosures of classified information across computer systems.

False

When you signed the SCI NdS, you acknowledged that any breach of this agreement could result in the termination of your SCI access and your employment as well as prosecution of you under U.S. criminal laws.

true

Which of the following is not a requirement of a secure telephone system in a SCIF?

c. Detects attempted or actual unauthorized human entry into a SCIF

____________________is required to access certain areas of a SCIF and classified information.

a. Need-to-know

Who provides accreditation for DoD SCIFs

b. Defense Intelligence Agency (DIA)

Visitors who have a visitor certification do not require an escort.

false

John has access to SCI and is currently legally separated from his wife. John is required to report his se

true

SCI is one of eight categories of information that require classified protection as outlined in Executive Order 13526.

true

If a SCIF has a high security lock, then an access control system is not required.

false

Walls in SCIFs must extend from true floor to true ceiling.

true

SI is the SCI control system marking abbreviation for which SCI control system?

b. TALENT KEYHOLE (WRONG)

The biggest vulnerability in SCIF forced entry is the ____________________.

a. Emergency exit doors

You signed an SCI Nondisclosure Statement during the __________________ process.

Debriefing (WRONG)

You are required to report suspicious co-worker activities

True

All Sensitive Compartmented Information Facilities (SCIFs) can be used to store Sensitive Compartmented Information (SCI).

False

Which SCI control system is designed to protect human intelligence?

c. TALENT KEYHOLE (TK) (WRONG)

Walls within a SCIF require acoustical protection measures and sound masking systems to protect SCI.

true

Jim works in a SCIF. Jim got drunk and passed out in a bar over the weekend. Jim is required to report this incident.

true