When Opening And Closing A Security Container Complete The
Which level of classified information could cause damage to national security
confidential
Classified information can be safeguarded by using
Vaults, secure rooms, secure telephones
Incorporating, paraphrasing, restating, or generating in a new form information that is already classified is know as
Derivative classification
You may be subject to sanctions if you negligently disclose classified information
true
Which of the following is required to access classified information
Clearance eligibility, need-to-know, SF312
Personnel security program establishes ___ for personnel security determinations and overall program management responsibilities
policies and procedures
Form to request a background investigation
SF 86
For to record end-of-day security checks
SF 701
Standard form of identification for DoD employees
Common access card
When opening & closing a security container, complete
SF 702
Which of the following must be reported
All of the above
Parts of the OPSEC process
idk
00:0301:23
Derivative classifiers are required to have all the following except
approval of OCA
Secret materials may be transmitted by the same methods as confidential materials
false
TS documents can be transmitted via
Defense courier service, secure fax
How often must you receive a defensive foreign travel briefing
At least once a year, prior to travel
A security infraction involves loss, compromise, or suspected compromise
false
Cover sheet to help protect a secret document
SF704
Method to transmit confidential materials to DoD agencies
USPS first class mail
Classified information can be destroyed using wich of the following methods
Shredding, burning, pulverizing
Prior to foreign travel, you must ensure antiterrorism/force protection level 1 training is current
true
The physical security program prevents unauthorized access to which of the following
Personnel, facilities, information, equipment
which of the following materials are subject to pre-publication review
books, speech, article,
Physical security is concerned with ___ & ___ measures designed to prevent unauthorized access
active,passive