Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
87 Cards in this Set
- Front
- Back
Who is responsible for ensuring that personnel within their command receive security education necessary to perform their duties? (CH-3) |
Commanding Officers |
|
Who is responsible for policy guidance, education requirements, and support for the DoN security education program? (CH-3) |
CNO N09N |
|
What shall all classified material/information be clearly marked with? (Ch-6) |
1. The date it was created 2. The appropriate classification level and associated markings 3. Warning notice |
|
The proper marking of classified material is the specific responsibility of who? (Ch-6) |
The original classifier |
|
What is the definition of electronic media? (Ch-6) |
Any equipment or interconnected system of equipment that is used in the transmission, storage, management, control, display, or reception of data or information.
|
|
When creating a classified document, what areas of the page shall be marked with the highest overall classification of the document? (Ch-6) |
Top and bottom center of the page. |
|
When possible, what should be kept unclassified to be used for identification and reference purposes? (Ch-6) |
The subject or title |
|
Portions of U.S. documents containing what shall be marked to reflect the country or international organization, and appropriate classification level? (Ch-6) |
NATO or Foreign Government
|
|
The letter "R" shall be used for the identification of what type of classified material? (Ch-6) |
NATO RESTRICTED or Foreign Government RESTRICTED information |
|
What advises personnel that additional protective measures are necessary? (Ch-6)
|
Warning Notices
|
|
What is the SF code and color of the Unclassified label used for marking classified media? |
Green; SF 710
|
|
What is the SF code and color of the Confidential label used for marking classified media? |
Blue; SF 708 |
|
What is the SF code and color of the Secret label used for marking classified media? |
Red; SF 707 |
|
What is the SF code and color of the Top Secret label used for marking classified media? |
Orange; SF 706 |
|
What is the SF code and color of the SCI label used for marking classified media? |
Yellow; SF 712 |
|
Who can change the level of classification on a classified document? (Ch-6)
|
The Original Classification Authority (OCA) with jurisdiction over the classified information.
|
|
A normal duration of classification is not normally authorized for more than how many years? (Ch-6) |
25 Years |
|
All declassification actions occur on what day of the year? |
31 December |
|
Who is overall responsible for ensuring that classified information is processed in secure facilities on accredited information systems? (Ch-7) |
Commanding Officers |
|
In regards to safeguarding Top Secret material, it shall: (Ch-7) |
Be continuously accounted for, be individually serialized and entered into a command Top Secret register or log. |
|
Who is responsible for maintaining and accounting for all TS material? (Ch-7) |
Top Secret Control Officers |
|
How long shall the TS log be retained? (Ch-7)
|
5 years
|
|
When safeguarding Secret material, administrative procedures shall be put in place to protect Secret material based on what? (Ch-7) |
Location, environment and threat |
|
Who shall establish procedures to ensure that only visitors with an appropriate eligibility determination and need-to-know are granted access to classified information? (Ch-7) |
Commanding Officers |
|
Classified meetings may only be held where? (Ch-7) |
At U.S. Government agency's or a cleared DoD contractor facility |
|
Secret and Confidential working papers shall be: (Ch-7) |
Dated when created and clearly marked with the classification level and the words "Working Paper" on the top left corner of the 1st page. |
|
Working papers shall not be kept for more than how many days? (Ch-7) |
180 days |
|
What is the purpose of an Alternative Compensatory Control Measure (ACCM)? (Ch-7) |
To strictly enforce the "need-to-know" regarding classified information |
|
The Activity Security Checklist (SF 701) is used to ensure what? (Ch-7)
|
That all areas within the space are cleared of classified information.
|
|
The Security Container Check Sheet (SF 702) is used for: (Ch-7) |
Recording when a space or safe is opened and closed and to show that a space is properly secured. |
|
The SF-701 and SF-702 may be destroyed after how many days? (Ch-7) |
30 Days unless otherwise instructed |
|
Couriers shall be provided what type of authorization when escorting classified material? (Ch-7) |
Written authorization |
|
What is the DD form number for the Courier Authorization Card? Ch-9 |
DD Form 2501 |
|
What are the three forms of identification authorizing transportation of classified material? |
The DD Form 2501 Official travel orders Courier authorization letter |
|
Classified material shall be enclosed within what 2 types of sealed envelopes? |
Opaque |
|
The classified information shall or shall not be addressed to any specific individual but may be addressed to a specific office or department?
|
Shall Not Be
|
|
The inner envelope of the classified material shall show what? |
The address of the recipient The address of the sender The highest level of classification of the contacts.
|
|
Acknowledgement of receipt is required for (TS) and (S) material that is transported in and out of the command. What is the form number for the record of receipt that is placed in the inner cover of the package? Ch-9 |
OPNAV 5511/10 |
|
How long are (TS) and (S) receipts retained for? Ch-9 |
TS: 5 Years S: 2 Years |
|
What is required when transporting classified material within the command? Ch-9 |
A cover sheet to prevent inadvertent disclosure. |
|
Who has overall responsibility and liability for the information that is being transported? Ch-9 |
The Courier |
|
When an individual has a reoccurring need to escort classified material, the expiration on the courier card shall not exceed how many years? Ch-9 |
3 Years |
|
What establishes and publishes the minimum standards and specifications for containers, vault doors, modular vaults and associated security devices suitable for the storage and destruction of classified information? Ch-10 |
The General Services Administration (GSA) |
|
What website can you refer to for the standards and specifications of GSA approved locks? Ch-10 |
https://portal.navfac.navy.mil/portal/page |
|
Top Secret stored in a GSA approved security container shall follow what 2 controls? Ch-10 |
Continuous protection by cleared guard or security personnel and have an intrusion detection system (IDS) with a response time within 15 minutes of the alarm sounding. |
|
Secret stored in a GSA approved security container shall follow what controls? Ch-10 |
Continuous protection by cleared guard or duty personnel cleared at the Secret level. |
|
What controls apply to open storage areas for Secret information? Ch-10 |
Inspected every 4 hours Intrusion Detection System (IDS) with a response time of 15 minutes by guard or duty personnel
|
|
What are the two types of security containers that are GSA approved and are currently manufactured? Ch-10 |
Class 5 and Class 6 |
|
In order for a security container/vault door to be considered valid, it must have a GSA label with what words affixed to it? Ch-10 |
"GSA approved security Container" or "Vault Door" |
|
Top Secret information shall not be removed from designated work spaces during off duty hours except as authorized by who? Ch-10 |
SECDEF Secretaries of the Military Combatant Commanders CNO N09N |
|
Secret and Confidential information shall not be removed from designated work spaces during off duty hours except as authorized by who? Ch-10 |
CNO N09N Fleet Commanders Commanders of Naval Systems Commands Chief of Naval Research Commandant of the Marine Corps Commanding General of U.S. Marine Forces Command |
|
Combinations will be changed for what following reasons? Ch-10
|
First placed in use with the standard combo 50-25-50
When an individual no longer requires access to the space compromise Taken out of service with the padlock combo 10-20-30 |
|
When setting a combination, what factors should not be used? Ch-10 |
Sequential numbers Multiples of five Ascending or descending numbers Personal data The same combo for more than one container |
|
What form shall be used to record the combination, security classification and contact information of personnel to be contacted in the event of possible compromise? Ch-10 |
Security Container Information SF-700 |
|
What type of system is used to detect not deter intrusion? Ch-10 |
Electronic Security System (ESS) |
|
ESS's are a combination of one or more of the following: Ch-10 |
Intrusion Detection System Closed circuit TV Access Control System. |
|
What are some of the electronic security systems that are used to detect intrusion? Ch-10 |
heat sensors, door sensors, cameras, thermal imagers, card readers, and biometrics. |
|
What methods are used in the destruction of classified materials? Ch-10 |
Cross-cut shredding, burning, wet pulping, mutilation, chemical decomposition and pulverizing. |
|
Cross-cut shredders shall reduce the shreds of classified information to no more than how many millimeters? Ch-10 |
5 square millimeters or 3/64" wide by 1/2" long |
|
Residue from disintegrators shall not exceed how many millimeters in size? Ch-10 |
5 mm |
|
Pulping devices with how many inches or smaller screens may be used to destroy classified material? Ch-10 |
1/4 inch |
|
What type of shredder shall not be used for destruction of classified information? Ch-10 |
Strip Shredder |
|
What form shall be used in the destruction of classified material? Ch-10 |
OPNAV 5511/12 |
|
What information is contained on the OPNAV 5511/12 classified material destruction report? Ch-10 |
Date of destruction Method of destruction Identification of the information destroyed Signature of personnel that witnessed the destruction
|
|
How many personnel are required for the destruction of Top Secret material? Ch-10 |
2 |
|
How long shall the OPNAV 5511/12 document be retained after destruction of classified material? Ch-10 |
5 Years |
|
What is a loss of classified information? Ch-12 |
Information cannot be located or physically accounted for. |
|
What is a Compromise? Ch-12
|
The unauthorized disclosure of classified information to a person(s) who does not have a valid security clearance, authorized access or need-to-know.
|
|
When does a possible compromise occur? Ch-12 |
When classified information is not properly controlled.
|
|
Who is overall responsible for the Preliminary Inquiry? Ch-12 |
Commanding officers
|
|
Who is responsible for overseeing the Preliminary Inquiry and coordinating with the Information Assurance Manager if the compromise occurred over an IT system? Ch-12 |
Security Managers |
|
The individual that discovers the loss or compromise shall immediately report the discovery to who? Ch-12 |
The CO and Security Manager |
|
Security Managers should not be _____________. Ch-12 |
Appointed |
|
What is a Preliminary Inquiry? Ch-12 |
The process to determine the facts surrounding a possible loss or compromise. |
|
The CO shall appoint in what a command official to conduct the PI? This official will have a valid security clearance and access regarding the classification level of information involved. Ch-12 |
In writing |
|
A Preliminary Inquiry shall be started and completed within how many hours of initial discovery of the loss of compromise? Ch-12 |
72-hours |
|
How long shall a Preliminary inquiry be kept on file? Ch-12 |
2 years |
|
What shall a Preliminary Inquiry include? Ch-12 |
Classification level of the information involved All identification markings or serial numbers The number of Pages The command point of contact The NCIS Agent contacted. |
|
When are JAGMAN investigations required? Ch-12 |
In the event that disciplinary action is being considered or recommended by the Preliminary Inquiry, or when compromise of classified information is considered likely to have occurred. |
|
What is the purpose of a JAGMAN investigation? Ch-12 |
To provide a more detailed investigation and recommendation of disciplinary action or additional corrective action. |
|
When the JAGMAN investigation is completed, it shall be forwarded through the administrative chain of command to who? Ch-12 |
CNO N09N2 |
|
Each superior in the chain of command will review the JAGMAN investigation and do what? Ch-12 |
Approve/disapprove of the findings of the report. State and evaluate the corrective measures taken/recommended to prevent future occurrences. Review the disciplinary action taken/recommended to ensure it is appropriate. |
|
When it is determined that a compromise of classified information has occurred, NCIS may request that ____________________ initiate a classification review of the compromise information with the cognizant OCA? Ch-12 |
CNO N09N2 |
|
What is a Public Media Compromise? Ch-12 |
The unofficial release of DoD classified information to the public resulting in its unauthorized disclosure. |
|
Who is responsible for ensuring that all know/suspected instances of unauthorized public disclosures of classified info is promptly reported, investigated, and that corrective action is taken? Ch-12 |
CNO N09N2 |
|
If a command receives compromised classified information, what shall they do? Ch-12 |
First, notify the mailing command. Second, if the information was improperly prepared/transmitted, the receiving command will report the discrepancy with OPNAV 5511/51 Security Discrepancy Notice. |
|
How long shall a OPNAV 5511/51 Security Discrepancy Notice be retained on file? Ch-12 |
2 Years |