WITH SOLUTIONS 2024
The purpose of the DoD information security program is to _________________________. Select all that
apply.
Select one or more:
a.
Protect national security information
b.
Demonstrate a commitment to transparency in Government
c.
Classify as much government information as possible - ANSWER A and B
Which volumes of DoDM 5200.01 provide guidance and direction on classification management,
marking, protection, and handling requirements for classified information? Select all that apply.
Select one or more:
a.
Volume 1
b.
Volume 2
c.
Volume 3
d.
Volume 4 - ANSWER A, B and C
The unauthorized disclosure of this type of information could reasonably be expected to cause
exceptionally grave damage to our national security.
Select one:
a.
Top Secret
b.
,Secret
c.
Confidential - ANSWER A
The unauthorized disclosure of this type of information could reasonably be expected to cause damage
to our national security.
Select one:
a.
Top Secret
b.
Secret
c.
Confidential - ANSWER C
Derivative classifiers are the individuals who generate or create new material based on existing
classification guidance.
Select one:
True
False - ANSWER True
If a derivative classifier believes information to be improperly classified, they can _____________ the
classification decision.
Select one:
a.
Ignore
b.
Override
c.
Challenge - ANSWER C
,In which order must documents containing classified information be marked?
Select one:
a.
Portion markings, banner markings, classification authority block
b.
Portion markings, classification authority block, banner markings
c.
Banner markings, portion markings, classification authority block - ANSWER A
What information is listed in the classification authority block on a document containing classified
information? Select all that apply.
Select one or more:
a.
Date on which to declassify the document
b.
Who created the classified document
c.
Classification level to downgrade to at a certain point in time (as applicable)
d.
Which source the information in the document was derived from
e.
Current classification level of the document - ANSWER A, B, C, D
Who references information from security classification guides (SCG) in order to classify information?
Select one:
a.
Derivative classifiers
b.
Original Classification Authorities
, c.
Both derivative classifiers and Original Classification Authorities - ANSWER A
Who issues security classification guides (SCG) for systems, plans, programs, projects, or missions?
Select one:
a.
Derivative classifiers
b.
Original Classification Authorities
c.
Both derivative classifiers and Original Classification Authorities - ANSWER B
All _____________ GSA-approved security containers must conform to Federal Specification FF-L-2740.
Select one:
a.
Handles on
b.
Doors on
c.
Locks for - ANSWER C
When classified information is in an authorized individual's hands, why should the individual use a
classified document cover sheet? Select all that apply.
Select one or more:
a.
To prevent inadvertent viewing of classified information by unauthorized personnel
b.
To alert holders to the presence of classified information
c.