• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/49

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

49 Cards in this Set

  • Front
  • Back
What is the informal assessment of the security posture of a command to be used as a self-help tool?
Assist Visit
What are the classification authority, office of origin, warning notices, intelligence and other special control markings and declassification/downgrading instructions of a classified document?
Associated Markings
Who is a person who has a need-to-know for the spcedified classified information in the performance of official duties and who has been granted an eligibility determination at the required level?
Authorized person
What is an auauthorized disclosure of classified information to one or more persons who do not possess a current valid security clearance?
Compromise
What is the analysis of encrypted messages; the steps or processes involved in converting encrypted messages into plain text without intitial knowledge of the system of key employed in the encryption?
Cryptanalysis
What consists of four tiers designed to provide an integrated, end-to-end key management, and Communications Security (COMSEC) material generation, distribution, and accounting system for the Department of Defense and civilian agencies?
Electronic Key Management System (EKMS)
NATO is a military alliance of how many countries from North American and Europe?
26
What are the measures and controls prescribed to protect classified information known as?
Safeguarding
Who is responsible for implementing the ISP and shall have direct access to the commanding officer?
Security Manager
Who exercises control over receipt, correction, stowage, security, accounting, distribution, and authorized destruction of all NWPs?
NWP custodian
WHo is responsible for ensuring that NATO information is correctly controlled and accounted for, and that NATO security procedures are observed?
NATO Control Officer
The terms INformation Systems Security Manager (ISSM) and Information Systems Security Officer (ISSO) were replaced with what terms?
Information Assurance Manager (IAM) and Information Assurance Officer (IAO)
In case of a natural disaster or civil disturbance, Commanding Officers shall develop an _______.
Emergency Plan
What are the priorities for emergency destruction?
Top Secret, Secret, Confidential
What is the only reason to classify information?
To protect national security
What is the classification level applied to information whose unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security?
Top Secret
What ist he classification level applied to information whose unauthorized disclosure could reasonably be expected to cause damage to the national security?
Secret
What ist he classification level applied to information whose unauthorized disclosure could reasonably be expected to cause damage to the national security?
Confidential
The authority to originally classify information as Top Secret, Secret, or Confidential rests with whom?
SECNAV and officials delegated authority
The Original Classifying Authority (OCA) shall attempt to establish a specific date or event for declassification, however the date or event shall not exceed ____ years from the date of the original classification?
25
What information is exempted from mandatory declassification review?
Information originated by the incumbent President and staff
What are teh primary reference source for derivative classifiers to identify the level and duration of classification for specific information elements?
Security Classifying Guides (SCG's)
What program is a computerized database that provides for the standardization, centralized management and issuance of all DON SCG's?
RANKIN
Classified documents need to be marked where to show the highest overall classification level of the information they contain?
Face and back cover, top and bottom center
RESTRICTED DATA is defined in what act?
Atomic Energy Act of 1954
What designator identifies all COMSEC documetns and keying material which are used to protect or authenticate classified or controlled unclassified government or government-derived information?
CRYPTO
What is a combination of two unclassified words with an unclassified meaning known as?
Nicknames
What is a combination of two non-code words that may or may not be classified and may or may not have a classified meaning known as?
Exercise term
What is a single clssified word with a classified meaning?
Code Word
Who shall ensure that IT systems provide for classification designation of data stored in internal memory or maintained on fixed storage media?
Information Assurance Managers
What level of control shall be afforded to classified information?
Commensurate with its assigned security classification level
Top Secret Information shall be physically sighted or accounted for at least how often?
Annually
Which form will Commanding officers use for end of the day security checks to ensure that all areas whcih process classified information are properly secured?
SF 701, Activity Security Checklist
Classified information originated in a non-DOD department or agency shall not be disseminated outside the DOD without the consent of the originator except where specifically permitted (also known as)
Third Agency Rule
The courier card (DD 2501) is valid for a maximum of how long?
3 years
Senate regulations require that all classsified material intended for delivery to any Sentator, staff member, Committee or other Senate office be delivered to where?
Office of Senate Security (OSS)
Who establishes and publishes minimum standards, specifications, and supply schedules for containers, vault doors, modular vaults, and associated security devices suitable for the storage and destruction of classified information?
General Services Administration (GSA)
What consists of monitors and electronic sensors designed to detect, not prevent, an attempted intrusion?
Intrusion Detection System (IDS)
What consists of card reader devices and/or biometrics, such as hand geometry, iris or fingerprint scanners, adn the computers to control them?
Access Conrol Systems (ACS)
What system is designed to assess,view areas, or detect an intrusion?
CCTV
A cross-cut shredder shall reduce the information to shreads no greater than?
five square millimeters
Which form may be used for a record desctruction for Top Secret Information?
OPNAV 5511/12 "Classified Material Destruction Report"
In a vault the floors and walls shall be constructed of ____ inches of reinforced-concrete to meet current structural standards.
8
What is designed to provide a contractor with the security requirements and classifiction guidance needed for performance on a classified contract?
DD 254
After the initial discovery of a loss or compromise of classified material how does the command have to initiate and complete a preliminary investigation (PI)?
72 hours
What is a multi-disciplinary analysis to determine the effect of a compromise of classified information on national security?
Damage Assessment
What form is used for Security container information?
SF700
What form is used for Security Container Check Sheet?
SF702
What form is used for a Secret Label?
SF707