• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/87

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

87 Cards in this Set

  • Front
  • Back

Who is responsible for ensuring that personnel within their command receive security education necessary to perform their duties? (CH-3)

Commanding Officers

Who is responsible for policy guidance, education requirements, and support for the DoN security education program? (CH-3)

CNO N09N

What shall all classified material/information be clearly marked with? (Ch-6)

1. The date it was created


2. The appropriate classification level and associated markings


3. Warning notice

The proper marking of classified material is the specific responsibility of who? (Ch-6)

The original classifier

What is the definition of electronic media? (Ch-6)

Any equipment or interconnected system of equipment that is used in the transmission, storage, management, control, display, or reception of data or information.


When creating a classified document, what areas of the page shall be marked with the highest overall classification of the document? (Ch-6)

Top and bottom center of the page.

When possible, what should be kept unclassified to be used for identification and reference purposes? (Ch-6)

The subject or title

Portions of U.S. documents containing what shall be marked to reflect the country or international organization, and appropriate classification level? (Ch-6)

NATO or Foreign Government


The letter "R" shall be used for the identification of what type of classified material? (Ch-6)

NATO RESTRICTED or Foreign Government RESTRICTED information

What advises personnel that additional protective measures are necessary? (Ch-6)
Warning Notices

What is the SF code and color of the Unclassified label used for marking classified media?

Green; SF 710


What is the SF code and color of the Confidential label used for marking classified media?

Blue; SF 708

What is the SF code and color of the Secret label used for marking classified media?

Red; SF 707

What is the SF code and color of the Top Secret label used for marking classified media?

Orange; SF 706

What is the SF code and color of the SCI label used for marking classified media?

Yellow; SF 712

Who can change the level of classification on a classified document? (Ch-6)
The Original Classification Authority (OCA) with jurisdiction over the classified information.

A normal duration of classification is not normally authorized for more than how many years? (Ch-6)

25 Years

All declassification actions occur on what day of the year?

31 December

Who is overall responsible for ensuring that classified information is processed in secure facilities on accredited information systems? (Ch-7)

Commanding Officers

In regards to safeguarding Top Secret material, it shall: (Ch-7)

Be continuously accounted for, be individually serialized and entered into a command Top Secret register or log.

Who is responsible for maintaining and accounting for all TS material? (Ch-7)

Top Secret Control Officers

How long shall the TS log be retained? (Ch-7)
5 years

When safeguarding Secret material, administrative procedures shall be put in place to protect Secret material based on what? (Ch-7)

Location, environment and threat

Who shall establish procedures to ensure that only visitors with an appropriate eligibility determination and need-to-know are granted access to classified information? (Ch-7)

Commanding Officers

Classified meetings may only be held where? (Ch-7)

At U.S. Government agency's or a cleared DoD contractor facility

Secret and Confidential working papers shall be: (Ch-7)

Dated when created and clearly marked with the classification level and the words "Working Paper" on the top left corner of the 1st page.

Working papers shall not be kept for more than how many days? (Ch-7)

180 days

What is the purpose of an Alternative Compensatory Control Measure (ACCM)? (Ch-7)

To strictly enforce the "need-to-know" regarding classified information

The Activity Security Checklist (SF 701) is used to ensure what? (Ch-7)
That all areas within the space are cleared of classified information.

The Security Container Check Sheet (SF 702) is used for: (Ch-7)

Recording when a space or safe is opened and closed and to show that a space is properly secured.

The SF-701 and SF-702 may be destroyed after how many days? (Ch-7)

30 Days unless otherwise instructed

Couriers shall be provided what type of authorization when escorting classified material? (Ch-7)

Written authorization

What is the DD form number for the Courier Authorization Card? Ch-9

DD Form 2501

What are the three forms of identification authorizing transportation of classified material?

The DD Form 2501


Official travel orders


Courier authorization letter

Classified material shall be enclosed within what 2 types of sealed envelopes?

Opaque

The classified information shall or shall not be addressed to any specific individual but may be addressed to a specific office or department?
Shall Not Be

The inner envelope of the classified material shall show what?

The address of the recipient


The address of the sender


The highest level of classification of the contacts.


Acknowledgement of receipt is required for (TS) and (S) material that is transported in and out of the command. What is the form number for the record of receipt that is placed in the inner cover of the package? Ch-9

OPNAV 5511/10

How long are (TS) and (S) receipts retained for? Ch-9

TS: 5 Years


S: 2 Years

What is required when transporting classified material within the command? Ch-9

A cover sheet to prevent inadvertent disclosure.

Who has overall responsibility and liability for the information that is being transported? Ch-9

The Courier

When an individual has a reoccurring need to escort classified material, the expiration on the courier card shall not exceed how many years? Ch-9

3 Years

What establishes and publishes the minimum standards and specifications for containers, vault doors, modular vaults and associated security devices suitable for the storage and destruction of classified information? Ch-10

The General Services Administration (GSA)

What website can you refer to for the standards and specifications of GSA approved locks? Ch-10

https://portal.navfac.navy.mil/portal/page

Top Secret stored in a GSA approved security container shall follow what 2 controls? Ch-10

Continuous protection by cleared guard or security personnel and have an intrusion detection system (IDS) with a response time within 15 minutes of the alarm sounding.

Secret stored in a GSA approved security container shall follow what controls? Ch-10

Continuous protection by cleared guard or duty personnel cleared at the Secret level.

What controls apply to open storage areas for Secret information? Ch-10

Inspected every 4 hours


Intrusion Detection System (IDS) with a response time of 15 minutes by guard or duty personnel


What are the two types of security containers that are GSA approved and are currently manufactured? Ch-10

Class 5 and Class 6

In order for a security container/vault door to be considered valid, it must have a GSA label with what words affixed to it? Ch-10

"GSA approved security Container" or "Vault Door"

Top Secret information shall not be removed from designated work spaces during off duty hours except as authorized by who? Ch-10

SECDEF


Secretaries of the Military


Combatant Commanders


CNO N09N

Secret and Confidential information shall not be removed from designated work spaces during off duty hours except as authorized by who? Ch-10

CNO N09N


Fleet Commanders


Commanders of Naval Systems Commands


Chief of Naval Research


Commandant of the Marine Corps


Commanding General of U.S. Marine Forces Command

Combinations will be changed for what following reasons? Ch-10
First placed in use with the standard combo 50-25-50
When an individual no longer requires access to the space
compromise
Taken out of service with the padlock combo 10-20-30

When setting a combination, what factors should not be used? Ch-10

Sequential numbers


Multiples of five


Ascending or descending numbers


Personal data


The same combo for more than one container

What form shall be used to record the combination, security classification and contact information of personnel to be contacted in the event of possible compromise? Ch-10

Security Container Information SF-700

What type of system is used to detect not deter intrusion? Ch-10

Electronic Security System (ESS)

ESS's are a combination of one or more of the following: Ch-10

Intrusion Detection System


Closed circuit TV


Access Control System.

What are some of the electronic security systems that are used to detect intrusion? Ch-10

heat sensors, door sensors, cameras, thermal imagers, card readers, and biometrics.

What methods are used in the destruction of classified materials? Ch-10

Cross-cut shredding, burning, wet pulping, mutilation, chemical decomposition and pulverizing.

Cross-cut shredders shall reduce the shreds of classified information to no more than how many millimeters? Ch-10

5 square millimeters or 3/64" wide by 1/2" long

Residue from disintegrators shall not exceed how many millimeters in size? Ch-10

5 mm

Pulping devices with how many inches or smaller screens may be used to destroy classified material? Ch-10

1/4 inch

What type of shredder shall not be used for destruction of classified information? Ch-10

Strip Shredder

What form shall be used in the destruction of classified material? Ch-10

OPNAV 5511/12

What information is contained on the OPNAV 5511/12 classified material destruction report? Ch-10

Date of destruction


Method of destruction


Identification of the information destroyed


Signature of personnel that witnessed the destruction


How many personnel are required for the destruction of Top Secret material? Ch-10

2

How long shall the OPNAV 5511/12 document be retained after destruction of classified material? Ch-10

5 Years

What is a loss of classified information? Ch-12

Information cannot be located or physically accounted for.

What is a Compromise? Ch-12
The unauthorized disclosure of classified information to a person(s) who does not have a valid security clearance, authorized access or need-to-know.

When does a possible compromise occur? Ch-12

When classified information is not properly controlled.


Who is overall responsible for the Preliminary Inquiry? Ch-12

Commanding officers


Who is responsible for overseeing the Preliminary Inquiry and coordinating with the Information Assurance Manager if the compromise occurred over an IT system? Ch-12

Security Managers

The individual that discovers the loss or compromise shall immediately report the discovery to who? Ch-12

The CO and Security Manager

Security Managers should not be _____________. Ch-12

Appointed

What is a Preliminary Inquiry? Ch-12

The process to determine the facts surrounding a possible loss or compromise.

The CO shall appoint in what a command official to conduct the PI? This official will have a valid security clearance and access regarding the classification level of information involved. Ch-12

In writing

A Preliminary Inquiry shall be started and completed within how many hours of initial discovery of the loss of compromise? Ch-12

72-hours

How long shall a Preliminary inquiry be kept on file? Ch-12

2 years

What shall a Preliminary Inquiry include? Ch-12

Classification level of the information involved


All identification markings or serial numbers


The number of Pages


The command point of contact


The NCIS Agent contacted.

When are JAGMAN investigations required? Ch-12

In the event that disciplinary action is being considered or recommended by the Preliminary Inquiry, or when compromise of classified information is considered likely to have occurred.

What is the purpose of a JAGMAN investigation? Ch-12

To provide a more detailed investigation and recommendation of disciplinary action or additional corrective action.

When the JAGMAN investigation is completed, it shall be forwarded through the administrative chain of command to who? Ch-12

CNO N09N2

Each superior in the chain of command will review the JAGMAN investigation and do what? Ch-12

Approve/disapprove of the findings of the report.


State and evaluate the corrective measures taken/recommended to prevent future occurrences.


Review the disciplinary action taken/recommended to ensure it is appropriate.

When it is determined that a compromise of classified information has occurred, NCIS may request that ____________________ initiate a classification review of the compromise information with the cognizant OCA? Ch-12

CNO N09N2

What is a Public Media Compromise? Ch-12

The unofficial release of DoD classified information to the public resulting in its unauthorized disclosure.

Who is responsible for ensuring that all know/suspected instances of unauthorized public disclosures of classified info is promptly reported, investigated, and that corrective action is taken? Ch-12

CNO N09N2

If a command receives compromised classified information, what shall they do? Ch-12

First, notify the mailing command. Second, if the information was improperly prepared/transmitted, the receiving command will report the discrepancy with OPNAV 5511/51 Security Discrepancy Notice.

How long shall a OPNAV 5511/51 Security Discrepancy Notice be retained on file? Ch-12

2 Years