Army Information Security
19 community-sourced questions and answers. Free — no login.
What is the first step an OCA must take when originally classifying information?
Determine if the information is official government information
When information, in the interest of national Security, no longer requires protection at any level, it should be:
Declassified
What information do SCG provide about systems, plans, programs, projects, or missions?
All of the above
The unauthorized disclosure of this type of information could reasonably be expected to cause serious damage to our national security
Secret
If an individual inserts a thumb drive containing classified information on a computer in the office that is not part of the classified information system, what type of security incident is this?
Spillage
Where do the reasons for classifying certain items, elements or categories of information originally come from?
Executive Order 13526
What type of the classification process is a way for members of the public to request the review of specific classified information?
Mandatory Declassification Review
What is required to access classified information? select all that apply
Eligibility, Need-to-Know, Signed SF-312, Nondisclosure Agreement
Which level of classified information may be transported via USPS mail? select all that apply
Secret, Confidential
What information is listed in the classification authority block on a document containing classified information?select all that apply
Classified by, derived from, classification level to downgrade to at a certain point in time (as applicable), date on which to declassify the doc
Who has responsibility for the overall policy direction of the information security program?
ISOO
If an individual fails to secure the SCIF at the end of the day and, subsequently, unescorted cleaning personnel access the SCIF and see classified information, what type of security incident is this?
Security violation
In which order must documents containing classified information be marked?
Banner markings,
When classified information is in an authorized individuals hands, why should the individual use a classified document cover sheet? select all that apply
To alert holders to the presence of classified information and to prevent inadvertent view of classified information by unauthorized personnel
Request for waivers and exceptions must identify the specific provision or provisions of the _______ for which the waiver or exception is sought.
DoD Information Security Manual
The unauthorized disclosure of top-secret information could reasonably be expected to cause _________ to our national security
Exceptionally grave damage
Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?
Classification, marking, dissemination, downgrading, and destruction
What are the steps for the information security program lifecycle?
In a GSA-approved security container, in an authorized individual's head or hands, in information technology systems authorized for classified information
What are the authorize places for storing classified information? select all that apply
Compilation
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials