Security & IntelligenceAnswer Key

Information Security Program Training Army

10 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

The Tier 3 Investigation is designated for the following positions:

ANSWER

Non-critical sensitive

QUESTION 2

Which of the following methods may be used to transmit Top Secret material?

ANSWER

- Appropriately cleared courier - Protected facsimile, message or voice

QUESTION 3

Which of the following is responsible for the review of written materials for public release?

ANSWER

Defense Office of Republication and Security Review

QUESTION 4

Good Operations Security (OPSEC) practices DO NOT include:

ANSWER

Discussing sensitive information carefully in public

QUESTION 5

Examples of Controlled Unclassified Information (CUI) include:

ANSWER

- Inspection reports - Investigation documents Answer was wrong

QUESTION 6

The Physical Security Program is designed to:

ANSWER

Protect against espionage, sabotage, damage, and theft

QUESTION 7

All of the following are examples of Adverse Information that must be reported EXCEPT:

ANSWER

Traffic violations with a fine under $300

QUESTION 8

You must obtain a defensive foreign travel security briefing prior to travel or at least once a year from whom?

ANSWER

Security Office

QUESTION 9

What form is used to record the opening and closing of the security container?

ANSWER

SF702, Security Container Check Sheet

QUESTION 10

In addition to foreign travel requirements, those with SCI access must:

ANSWER

- Complete a foreign travel questionnaire prior to proceeding on travel - Complete a secondary questionnaire upon return

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials