We thoroughly check each answer to a question to provide you with the most correct answers. Found a mistake? Let us know about it through the REPORT button at the bottom of the page. Show Índice
Which of the following are examples of sanctions that may be applied to employees found responsible for unauthorized disclosure? Suspension w/o pay You are a cleared contractor employee and you are contacted via telephone by a reporter asking info about a classified project. What should you do? Refer the reporter to your Facility Security Officer (FSO) The term NDCI was coined to connote the seriousness of classified data spills. What does it stand for? Negligent Discharge of Classified Information Classified information that is deliberately disclosed to the media is considered _______. a Leak Select ALL the correct responses. Which of the following will require a prepublication review? Sending an article Your coworker would like to discuss a Secret project. She has a “need to know,” a Top Secret Clearance, and a signed SF-312. Can you show her the specifications? Yes, your coworker is an authorized recipient Serious security incidents that involve unauthorized disclosure in the public media must always be reported to ________. OUSD(I) Within the DoD, material proposed for public release undergoes prepublication review by the ___________. DOPSR Which of the following is a common misconception regarding unauthorized disclosure? The Whistle Blower Protection Act (PPD-19) Your Supervisor should always have access to the material you are working on, even is he/she does not have a “need-to-know?” False Select ALL the correct responses. Derivative classifiers must ensure _________. Initial Classification determinations Once you have been granted access, how long does your responsibility to protect classified information extend? Throughout your life Select ALL the correct responses. Which of the following are examples of damage that may be caused by unauthorized disclosure? Potential loss of life Select ALL the correct responses. Authorized recipients of controlled unclassified information (CUI) must _________. *****? Select ALL the correct responses. You are cleared employee and you discover an information leak. Which of the following actions must you take? Immediately protect from further disclosure Select ALL the correct responses. Which of the following are important elements of safeguarding classified information and CUI? Handling ______ must initially determine what level of damage would occur to information is unauthorized disclosure of that information occurred. the Original Classification Authority (OCA) Facility Security Officers (FSOs) report incidents … to ______? Their Industrial Security Rep (IS Rep) Select ALL the correct responses. Who may be consulted to conduct a damage assessment to determine effect of a compromise an national security? the Original Classification Authority (OCA) Where should DoD Employees look for guidance on safeguarding controlled unclassified information (CUI)? DoDM 5200.01 V4 Linda’s classified email was intercepted by a Russian Foreign Intelligence Entity, although this was not her intention. Did Linda commit espionage? b. No, because Linda did not intend for the Russian Foreign Intelligence Entity to see her email Leaks are ___________ disclosures of information to the media. . deliberate Cleared employees may be sent to prison for unauthorized disclosure of classified information. true DoD security managers use the ________________________ to report incidents of unauthorized disclosure of classified information and to track their investigations and associated actions. c. Industrial Security Facilities Database (ISFD) You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19), Protecting Whistleblowers with Access to Classified Information. true Who is responsible for specifying downgrading and declassification dates, events, and exemptions? . Original Classification Authority The unauthorized disclosure of this type of information is reasonably expected to cause damage to national security. secret Who determines which Component has investigative primacy when responsibility for an inquiry into an unauthorized public media disclosure is unclear? a. Defense Security Service (DSS) (WRONG) Unauthorized disclosure of information can ____________. It is NOT: A B and D only If you view classified information through the Internet on your work computer, either intentionally or inadvertently, what should you do first? c. Disconnect your computer from the network Colonel Rogers has to appear at a Senate hearing regarding a military program under his leadership. Does Colonel Rogers have to submit his Congressional briefing for a prepublication review before the hearing? a. Only if he will discuss classified information during the hearing (WRONG) As a cleared employee you pledged to ________________________ when you signed the Classified Information Nondisclosure Agreement. b. Be an Original Classification Authority of classified information (wrong) Jill left a classified document on a photocopier and Jack found it when he went to make a copy. Jack has the appropriate personnel security clearance eligibility, but he does not have a need-to-know for the information that was left on the copier. This is an example of unauthorized disclosure of classified information due to improper safeguarding procedures. true Which of the following statements is true about making copies of classified documents? b. You can make copies of classified documents on any copier provided you alert others in the immediate area before and after making your copies. (WRONG) If a classified data spill occurs, you must first destroy the hard drive to prevent any further unauthorized dissemination. False Your friend called and told you that he saw information about the classified XYZ program on the Internet. As a cleared employee who does not work on the XYZ program, is it okay for you to view that information on the Internet since it’s already in the public domain? a. Yes, because you are a cleared employee, you may view the information. (WRONG) If you are a DoD employee, to whom should you report actual or suspected unauthorized disclosure of classified information? b. Defense Security Service (DSS) (WRONG) Where should DoD employees look for guidance on safeguarding classified information? b. E.O. 13526 and DoDM 5200.01 When classified information or Controlled Unclassified Information (CUI) is transferred or transmitted to a system that lacks the appropriate security level or required access controls, this is a _________. b. infraction (WRONG) Who is the official channel for industry for engaging the news media? a. Derivative Classifier
Examples of this type of unauthorized disclosure include, but are not limited to, leaving a classified document on a photocopier, forgetting to secure classified information before leaving your office, and discussing classified information in earshot of unauthorized recipients. Espionage: The unauthorized transmittal of classified information to a foreign nation or entities with the intent to harm the US or aid a foreign power. An event involving the exposure of information to entities not authorized access to the information. (3) "Confidential" shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause damage to the national security. Section 1.1(b) of EO 12356 states that "except as otherwise provided by statute, no other terms shall be used to identify classified information." Which of the following is a misconception unauthorized disclosure of classified information?Two other common misconceptions about unauthorized disclosure of classified information are that cleared employees can receive protection under the Presidential Policy Directive 19 (PPD-19), Protecting Whistleblowers with Access to Classified Information or under the First Amendment.
What are examples of CUI?What are examples of CUI?. Personally Identifiable Information (PII). Sensitive Personally Identifiable Information (SPII). Proprietary Business Information (PBI) or currently known within EPA as Confidential Business Information (CBI). Unclassified Controlled Technical Information (UCTI). Sensitive but Unclassified (SBU). What is CUI specified quizlet?What is CUI Specified? A. The subset of CUI in which the authorizing law, regulation, or government-wide policy contains specific handling controls that it requires or permits agencies to use. - Correct Answer.
What is CUI basic answers?CUI Basic is the subset of CUI for which the authorizing law, regulation, or government-wide policy does not set out specific handling or dissemination controls. Agencies handle CUI Basic according to the uniform set of controls set forth in DODI 5200.48 and the DOD CUI Registry.
|