Infosec Army Jko
20 community-sourced questions and answers. Free — no login.
If an individual inserts a thumb drive containing classified information on a computer in the office that is not part of the classified information system, what type of security incident is this?
Spillage - correct
When information, in the interest of national security, no longer requires protection at any level, it should be:
Declassified - correct
Where do the reasons for classifying certain items, elements or categories of information originally come from?
Executive Order 12526 - Correct
In which order must documents containing classified information be marked?
Portion markings, banner markings, classification authority block - correct
What information do security classification guides (SCG) provide about systems, plans, programs, projects, or missions?
all of the above -correct
What information is listed in the classification authority block on a document containing classified information? Select all that apply.
(ANSWER UNKNOWN) - Who created the classified document - Current classification level of the document - Classification level to downgrade to at a certain point in time (as applicable) - Which source the information in the document was derived from - Date on which to declassify the document
What is required to access classified information? Select all that apply.
-Eligibility - correct -Need-to-know - correct -Signed SF-312, Nondisclosure Agreement - correct
The unauthorized disclosure of this type of information could reasonably be expected to cause serious damage to our national security.
Secret - correct
When classified information is in an authorized individual's hands, why should the individual use a classified document cover sheet? Select all that apply.
-To prevent inadvertent viewing of classified information by unauthorized personnel - correct -To alert holders to the presence of classified information - correct
The unauthorized disclosure of Top Secret information could reasonably be expected to cause _______________ to our national security.
Exceptionally grave Damage - correct
What are the authorized places for storing classified information? Select all that apply.
(ANSWER UNKNOWN) -In information technology systems authorized for classified information -In an authorized individual's head or hands -In an authorized individual's locked desk drawer -In a GSA-approved security container
What type of declassification process is a way for members of the public to request the review of specific classified information?
Mandatory Declassification Review - correct
____________________occurs in some circumstances when information that is individually unclassified, or classified at a lower level, may be classified, or classified at a higher level, only if the combined information reveals an additional association or relationship.
Compilation - correct
What are the steps of the information security program lifecycle?
Classification, safeguarding, dissemination, declassification and destruction - correct
What is the first step an Original Classification Authority (OCA) must take when originally classifying information?
Determine if the information is official government information. - correct
Which level of classification information may be transported via USPS mail? Select all that apply.
-Secret - correct -confidential - correct
Whose guidelines should you follow for the destruction of storage media as thumb drives, zip drives, and computers?
National Security Agency - Correct
Who has responsibility for the overall policy direction of the information Security Program?
Director of the Information Security Oversight Office (ISOO) - correct
Requests for waivers and exceptions must identify the specific provision or provisions of the _____________ for which the waiver or exception is sought.
DoD Information Security Manual - correct
If an individual fails to secure the Sensitive Compartmented Information Facility (SCIF) at the end of the day and, subsequently, unescorted cleaning personnel access the SCIF and see classified information, what type of security incident is this?
Security Violation - correct
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials