• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
INFOCON Levels


5 - No risk


4 - Increased risk


3 - Risk identified


2 - Attack taken place


1 - Attack taking place

What Naval event led to EAP/EDP?

USS Pueblo

What is JPAS and what is on a JPAS report?


Joint Personnel Adjudication System


- Security clearance & access database


- System of record for Personnel Security, adjudication, clearance, clearance, verification, and history

What does TSCO stand for and who is out TSCO?


Top Secret Control Officer; Chief Clerico




Describe the effects to National Security from the following:


Top Secret


Secret


Confidential


TS - Exceptional Danger


S - Serious


C - Damage




DCS
Defense Courier Service; Issues courier cards

What is SSO and what (5) events should be reported?


Special Security Officer;


- Foreign interests


- Involvement with people or associations that promote unconstitutional practices


- Criminal sexual behavior


- Insubordinate with security procedures/processing


- Change of marital status with foreign national

What is SAER?
Security Access Eligibility Report: Used to identify an incident or any change in eligibility if an employee is still eligible for the security clearance.

What are the timeframes for:


S


TS


TS/SCI


ATO


IATO


S - 10yrs


TS - 5yrs


TS/SCI - 5yrs


ATO - 3yrs


IATO - 1yr

What are the following SFs:


SF-700


SF-701


SF-702


SF-703


SF-153


SF-312


SF-700 - Security Info (passwords/combos)


SF-701 - Security checklist


SF-702 - Open/Closure log


SF-703 - TS Coversheet


SF-153 - DIRTO


SF-312 - Classified Information Non-Disclosure Agreement

Who is the Security Manager?

Ms. Kidd

Difference between vulnerability and a threat


Vulnerability - weakness in the security scheme


Threat - a potential to cause harm to a system

NTD

Naval telecommunications directive-policy and procedures in regards to comms

What is accreditation?

System is approved to operate in a particular security mode