Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/36

Click to flip

36 Cards in this Set

  • Front
  • Back
Who is responsible for setting up and maintaining an information security program and personnel security program?
1. Sec of Navy
2. cno
3. adp
4. base security
Sec Nav
Who must be assigned if a command is eligible to receive classified material?
1. Commo
2. LCPO
3. User
4. Security Manager
4. Security Manager
what must the security manager be?
1. E-7 thru E-9
2. officer
3. civilian employee GS-11 or above
4. both 2 and 3

3. sometimes
4. both 2 and 3
the security manager is responsible to who?
1. xo
2. co
3. cno
4. dcms
2. co
If a command can handle top secret info who must be assigned in writing?
1. security manager
2. top secret control officer
3. senior enlisted member
4. senior civilian gs 11 or above
2. top secret control officer
TSCO is responsible to who?
1. CO
2. XO
3. security manager
4. nobody
3. security manager
What form is the CERTIFICATE OF PERSONNEL SECURITY INVESTIGATION, CLEARANCE AND ACCESS?
1. OPNAVINST 5510.1H
2. SECNAVINT 5510.23
3. OPNAVINST 5520/20
4. OPNAVINST 5510/10
3. OPNAVINST 5520/20
How often should personnel who have access to classified infor receive a refresher briefing?
1. every month
2. every 6 monts
3. once a year
4. every 2 years
3. once a year
How often should NIS agent give a counterespionage briefing be given?
1. every month
2. every 6 monts
3. once a year
4. every 2 years
4. every 2 years
What are the types of security violations?
1. missing and caught
2. compromise and possible compromise
3. witness and actual
4. theft and espionage
2. compromise and possible compromise
Preliminary inquiry will be conducted when classified information has been compromised or subject to compromised within how many days?
1. 7
2. within 2 or 3
3. 14
4. 30
2. within 2 or 3 days
What is an administrative investigation?
1. Jag manual investigation
2. DRB investigation
3. NCIS ivestigation
4. NJP investigation
1. Jag manual investigation
Reports of violations on a security discrepanicy notice?
1. opnav 5510.1h
2. opnav 5520/20
3. opnav 5511/51
4. opnav 5520.3
3. opnav 5511/51
Certain matters affecting national security must be reported to who?
1. FBI
2. CIA
3. NIS (naval investigation service)
4. Supervisor
3. NIS
All information concerning a suicide is forwarded to who?
1. NSA
2. NIS
3. Squardron commander
4. commodore
2. NIS
What classification causes damage to national security?
1. secret
2. top secret
3. confidential
4. unclas
3. confidential
What classification causes serious damage to national security?
1. secret
2. top secret
3. confidential
4. unclas
1. secret
What classification causes grave damage to national security?
1. secret
2. top secret
3. confidential
4. unclas
2. top secret
The archivist of the united states reviews records for declassification when the records are how old?
1. 15
2. 20
3. 25
4. 30
4. 30
Commands maintain Top Secret documents for how long?
1. 6 months
2. 1 year
3. 2 years
4. 3 years
3. 2 years
What is cover form for confidential material?
1. sf 701
2. sf 703
3. sf 704
4. sf 705
2. sf 703
What is cover form for top secret material?
1. sf 701
2. sf 703
3. sf 704
4. sf 705
4. sf 705
What is cover form for secret material?
1. sf 701
2. sf 703
3. sf 704
4. sf 705
3. sf 704
what form is utilized for activity security checklist?
1. sf 701
2. sf 703
3. sf 704
4. sf 700
1. sf 701
What form is used to seal combinations?
1. sf 701
2. sf 703
3. sf 704
4. sf 700
4. sf 700
What form is used security container check list each time users access a safe?
1. sf 700
2. sf 702
3. sf 704
4. sf 705
2. sf 702
Rotate the dial of the combination locks how many turns in the same direction?
1. 1
2. 2
3. 3
4. 4
4. 4
Destruction of record of top secret and secret material is how long?
1. 1
2. 2
3. 3
4. 4
2. 2
what has been the traditional method for destroying classified material?
1. shredding
2. burning
3. pulping
4. jetison
2. burning
The strip shredder cuts the material into strips no greater than inch in width?
1. 1/4
2. 1/8
3. 1/16
4. 1/32
4. 1/32
cross cut shredding shreds no largers than __inch by __inch?
1. 3/4 by 1/2
2. 3/16 by 1/3
2. 3/24 by 1/4
3. 3/64 by 1/2
3. 3/64 by 1/2
What is priority 3 for emergency destruction?
1. confidential
2. unclas
3. secret
4. top secret
1. confidential
the classification on publications should be stamped or printed where?
1. front page in the center
2. each page on the bottom
3. top and bottom of each page in the center.
4. never
3. top and bottom of each page in the center.
Preferably in what color should the stamp be?
1. black
2. blue
3. red
4. green
3. red
Each paragraph of a correspondence should be labeled with what if any?
1. precedence
2. classification
3. nothing
4. both 1 and 2
2. classification
True or False only U.S. citizens are granted access to classified information or assigned to sensitive duties.
True