Sensitive Compartmented Information (SCI) Security Refresher Exam 2023 Actual Questions and Answers with complete solutions
A security violation involves the loss, compromise, or suspected compromise of classified information. Security violations must be reported. Ans- true
You are required to report all foreign travel prior to departure, including day trips to Canada and Mexico. Ans- false
When you signed the SCI NdS, you agreed that anything you gained from unauthorized disclosure of SCI would become the property of the United States Government. Ans- true
Walls in SCIFs must extend from true floor to true ceiling. Ans- true
An SCI document that contains the dissemination control marking NOFORN indicates this document ___________________________________. Ans- a. Is not releasable to
foreign nationals
You must report external activist groups you or your co-workers are affiliated with regardless of their nature. Ans- true
Visitors may enter a SCIF without a visitor certification if they are escorted by indoctrinated personnel. Ans- true
If the ISSO permits it, you may share your password in a SCIF. Ans- false
The access control system for unattended SCIF entry must use ____________________ and _______________________ such as an access card and
personal identification number (PIN). Ans- b. Authentication, verification
SCI couriers must be appointed __________, have a signed letter of authorization and know the rules and regulations governing couriers and transporting classified material. Ans- in writing
In a SCIF, SCI must always be stored in a GSA-approved container. Ans- false
After setting the alarm on a SCIF, spinning the lock, and displaying the closed sign, you must complete the _____________________ form Ans- b. SF-701 NOT correct Which is the primary database used to verify personnel access to SCIFs outside DoD? Ans- b. Joint Personnel Adjudication System (JPAS) NOT CORRECT
If a SCIF has a high security lock, then an access control system is not required. Ans- false
The SCI control system marking should not be listed in the banner line on a classified document. Ans- false
_____________ is technically derived intelligence data other than imagery and signals intelligence that locates, identifies, or describes distinctive characteristics of targets. Ans- f. Measurement and Signature Intelligence (MASINT)
What piece of information is not required to be recorded on the SCIF visitor control log? Ans- f. Visitor's date of birth
The three primary types of SCIFs are referred to as closed storage SCIF, open storage SCIF, and ___________________. Ans- a. Continuous Operation SCIF
You must report any systemic weaknesses and anomalies. Ans- true
When closing a closed storage SCIF you must ensure all classified material has been stored, security containers are closed and locked, locked sign is displayed on security containers, and the SF-701 form is completed. Ans- true
SCI is required to be stored in a GSA-approved container in a Closed Storage SCIF. Ans- true
One company must be responsible for the installation, maintenance, and monitoring of the Intrusion Detection System (IDS) for SCIFs. Ans- true
SCI Material cannot be stored in _________________________________. Ans- b. An open storage SCIF (WRONG)
_____________ uses imagery, imagery intelligence, or geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the earth. Ans- b. Imagery Intelligence (IMINT) (WRONG)
Which of the following is the preferred method for transporting an SCI document from one SCIF to another? Ans- a. Defense Courier Service (DCS)
IS components, media, and/or memory may be brought into a SCIF and removed from a
SCIF if it has been properly logged and approved by the __________________________. Ans- c. Special Security Officer (SSO) or Information
Systems Security Officer (ISSO)
A security violation involves the loss, compromise, or suspected compromise of classified information. Security violations must be reported. Ans- true
You are required to report all foreign travel prior to departure, including day trips to Canada and Mexico. Ans- false
When you signed the SCI NdS, you agreed that anything you gained from unauthorized disclosure of SCI would become the property of the United States Government. Ans- true
Walls in SCIFs must extend from true floor to true ceiling. Ans- true
An SCI document that contains the dissemination control marking NOFORN indicates this document ___________________________________. Ans- a. Is not releasable to
foreign nationals
You must report external activist groups you or your co-workers are affiliated with regardless of their nature. Ans- true
Visitors may enter a SCIF without a visitor certification if they are escorted by indoctrinated personnel. Ans- true
If the ISSO permits it, you may share your password in a SCIF. Ans- false
The access control system for unattended SCIF entry must use ____________________ and _______________________ such as an access card and
personal identification number (PIN). Ans- b. Authentication, verification
SCI couriers must be appointed __________, have a signed letter of authorization and know the rules and regulations governing couriers and transporting classified material. Ans- in writing
In a SCIF, SCI must always be stored in a GSA-approved container. Ans- false
After setting the alarm on a SCIF, spinning the lock, and displaying the closed sign, you must complete the _____________________ form Ans- b. SF-701 NOT correct Which is the primary database used to verify personnel access to SCIFs outside DoD? Ans- b. Joint Personnel Adjudication System (JPAS) NOT CORRECT
If a SCIF has a high security lock, then an access control system is not required. Ans- false
The SCI control system marking should not be listed in the banner line on a classified document. Ans- false
_____________ is technically derived intelligence data other than imagery and signals intelligence that locates, identifies, or describes distinctive characteristics of targets. Ans- f. Measurement and Signature Intelligence (MASINT)
What piece of information is not required to be recorded on the SCIF visitor control log? Ans- f. Visitor's date of birth
The three primary types of SCIFs are referred to as closed storage SCIF, open storage SCIF, and ___________________. Ans- a. Continuous Operation SCIF
You must report any systemic weaknesses and anomalies. Ans- true
When closing a closed storage SCIF you must ensure all classified material has been stored, security containers are closed and locked, locked sign is displayed on security containers, and the SF-701 form is completed. Ans- true
SCI is required to be stored in a GSA-approved container in a Closed Storage SCIF. Ans- true
One company must be responsible for the installation, maintenance, and monitoring of the Intrusion Detection System (IDS) for SCIFs. Ans- true
SCI Material cannot be stored in _________________________________. Ans- b. An open storage SCIF (WRONG)
_____________ uses imagery, imagery intelligence, or geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the earth. Ans- b. Imagery Intelligence (IMINT) (WRONG)
Which of the following is the preferred method for transporting an SCI document from one SCIF to another? Ans- a. Defense Courier Service (DCS)
IS components, media, and/or memory may be brought into a SCIF and removed from a
SCIF if it has been properly logged and approved by the __________________________. Ans- c. Special Security Officer (SSO) or Information
Systems Security Officer (ISSO)