Security & IntelligenceAnswer Key

Army Information Security

19 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

What is the first step an OCA must take when originally classifying information?

ANSWER

Determine if the information is official government information

QUESTION 2

When information, in the interest of national Security, no longer requires protection at any level, it should be:

ANSWER

Declassified

QUESTION 3

What information do SCG provide about systems, plans, programs, projects, or missions?

ANSWER

All of the above

QUESTION 4

The unauthorized disclosure of this type of information could reasonably be expected to cause serious damage to our national security

ANSWER

Secret

QUESTION 5

If an individual inserts a thumb drive containing classified information on a computer in the office that is not part of the classified information system, what type of security incident is this?

ANSWER

Spillage

QUESTION 6

Where do the reasons for classifying certain items, elements or categories of information originally come from?

ANSWER

Executive Order 13526

QUESTION 7

What type of the classification process is a way for members of the public to request the review of specific classified information?

ANSWER

Mandatory Declassification Review

QUESTION 8

What is required to access classified information? select all that apply

ANSWER

Eligibility, Need-to-Know, Signed SF-312, Nondisclosure Agreement

QUESTION 9

Which level of classified information may be transported via USPS mail? select all that apply

ANSWER

Secret, Confidential

QUESTION 10

What information is listed in the classification authority block on a document containing classified information?select all that apply

ANSWER

Classified by, derived from, classification level to downgrade to at a certain point in time (as applicable), date on which to declassify the doc

QUESTION 11

Who has responsibility for the overall policy direction of the information security program?

ANSWER

ISOO

QUESTION 12

If an individual fails to secure the SCIF at the end of the day and, subsequently, unescorted cleaning personnel access the SCIF and see classified information, what type of security incident is this?

ANSWER

Security violation

QUESTION 13

In which order must documents containing classified information be marked?

ANSWER

Banner markings,

QUESTION 14

When classified information is in an authorized individuals hands, why should the individual use a classified document cover sheet? select all that apply

ANSWER

To alert holders to the presence of classified information and to prevent inadvertent view of classified information by unauthorized personnel

QUESTION 15

Request for waivers and exceptions must identify the specific provision or provisions of the _______ for which the waiver or exception is sought.

ANSWER

DoD Information Security Manual

QUESTION 16

The unauthorized disclosure of top-secret information could reasonably be expected to cause _________ to our national security

ANSWER

Exceptionally grave damage

QUESTION 17

Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?

ANSWER

Classification, marking, dissemination, downgrading, and destruction

QUESTION 18

What are the steps for the information security program lifecycle?

ANSWER

In a GSA-approved security container, in an authorized individual's head or hands, in information technology systems authorized for classified information

QUESTION 19

What are the authorize places for storing classified information? select all that apply

ANSWER

Compilation

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials