INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials!
0 view 0 purchase
Course
INF4831
Institution
INF4831
INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials!
The unauthorized disclosure of this type of information could reasonably be expected to cause serious damage to our national security.
Exceptionally grave damage
Derivative classifiers are the individuals wh...
inf4831 information security questions and answers
Written for
INF4831
All documents for this subject (31)
Seller
Follow
SUPERGRADES01
Reviews received
Content preview
INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS
A+ GRADED. Buy Quality Materials!
The unauthorized disclosure of this type of information could reasonably be
expected to cause serious damage to our national security.
Exceptionally grave damage
Derivative classifiers are the individuals who generate or create new material
based on existing classification guidance.
True
When classified information is in an authorized individual's hands, why should
the individual use a classified document cover sheet? Select all that apply.
- To alert holders to the presence of classified information
- To prevent inadvertent viewing of classified information by unauthorized personnel
Cleared U.S. military, civilian employees, or contractors may hand carry which
type of classified information?
All of the above
When information, in the interest of national security, no longer requires
protection at any level, it should be:
Declassified
When are "Downgrade To" instructions listed in the classification authority block
on documents containing classified information?
As applicable
What information do security classification guides (SCG) provide about systems,
plans, programs, projects, or missions?
All of the above
What is required to access classified information? Select all that apply.
- Eligibility
- Signed SF-312, Nondisclosure Agreement
- Need-to-know
The communication or physical transfer of classified information to an
unauthorized recipient is _________?
Unauthorized Disclosure
What are the steps of the information security program life cycle?
?
The unauthorized disclosure of Confidential information could reasonably be
expected to cause __________ to our national security.
Damage
Classification levels may be abbreviated (i.e., TS, S, C) in the banner of classified
documents.
False
Where can you find the Original Classification Authority's (OCA) contact
information in a security classification guide (SCG)?
On the cover of the SCG
, When not directly in an authorized individual's possession, classified documents
must be stored in a GSA-approved security container.
True
Access control measures detect and deter deliberate attempts to gain
unauthorized access to classified information.
True
Destruction refers to destroying classified information so that it can't be
recognized or reconstructed.
True
The purpose of the DoD information security program is to __________. Select all
that apply.
- Demonstrate a commitment to transparency in Government
- Protect national security information
Who provides implementation guidance for the Information Security Program
within the DoD?
Heads of DoD Components
The unauthorized disclosure of Top Secret information could reasonably be
expected to cause __________ to our national security.
Exceptionally grave damage
The unauthorized disclosure of this type of information could reasonably be
expected to cause damage to our national security.
Confidential
What is the first step an Original Classification Authority (OCA) must take when
originally classifying information?
Determine if the information is official government information
Who can be an Original Classification Authority (OCA)?
An individual authorized in writing, either by the President, the Vice President, or by
agency heads or officials designated by the President
Why must all documents containing classified information be marked using a
sequential process?
All of the above
What information is listed in the classification authority block on a document
containing classified information? Select all that apply.
- Who created the classified document
- Classification level to downgrade to at a certain point in time (as applicable)
- Which source the information in the document was derived form
- Date on which to declassify the document
Who issues security classification guides (SCG) for systems, plans, programs,
projects, or missions?
Original Classification Authorities
Who references information from security classification guides (SCG) in order to
classify information?
Derivative classifiers
Which of the following is an example of information technology that is authorized
for storing classified information?
On a computer connected to the Secure Internet Protocol Router Network (SIPRNET)
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller SUPERGRADES01. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $8.49. You're not tied to anything after your purchase.