Security & IntelligenceAnswer Key

Cdse Derivative Classification

26 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

A classified document is used as source material for a new document. What is this an example of?

ANSWER

Derivative classification

QUESTION 2

Including information in a new product that has already been classified is called:

ANSWER

Derivative classification

QUESTION 3

Derivative classification does not have the same impact and effects as original classification.

ANSWER

False

QUESTION 4

What is the importance of derivative classification?

ANSWER

Helps protect national security

QUESTION 5

Who bears principal responsibility for derivative classification accuracy in new products?

ANSWER

Derivative classifiers

QUESTION 6

Select ALL the correct responses. Derivative classifiers must:

ANSWER

Have access to classification guidance // Analyze and evaluate information to identify elements that require classification

QUESTION 7

The first step in derivatively classifying a new document is to determine the classification level based on existing classification guidance.

ANSWER

True

QUESTION 8

All of the following are steps in derivative classification EXCEPT:

ANSWER

Making the initial determination that information requires protection against unauthorized disclosure in the interest of national security.

QUESTION 9

Security Classification Guides (SCG) are the primary sources for derivative classification.

ANSWER

True

QUESTION 10

If you find a conflict in guidance, or you are uncertain about how to classify the new content, you should first:

ANSWER

Ask your security manager or Facility Security Officer

QUESTION 11

A Security Classification Guide (SCG) is:

ANSWER

A collection of precise, comprehensive guidance about specific program, system, operation, or weapon system elements of information to be classified.

QUESTION 12

Information taken from an existing classified source and generated into another form or medium, such as a video, DVD, or CD is an example of _______

ANSWER

Generating

QUESTION 13

Information taken directly from an existing classified source and stated verbatim in a new or different document is an example of ______

ANSWER

Extracting

QUESTION 14

The source document states:(S) The range of the weapon is 70 miles. The new document states:(S) The weapon may successfully be deployed at a range of 70 miles. Which concept was used to determine the derivative classification of the new document?

ANSWER

Contained In

QUESTION 15

The source document states:(S) The process takes three hours to complete. The new document states:(S) The process takes three hours to complete. Which concept was used to determine the derivative classification of the new document?

ANSWER

Contained In

QUESTION 16

A properly marked source document contains some Secret information. A new document does not contain the same information. However, the information in the new document will allow a reader to deduce the classified information. This is an example of the concept of _____

ANSWER

Revealed by

QUESTION 17

Which of the following statements applies to the classification concept of "Revealed by"?

ANSWER

Needs additional interpretation or analysis to deduce the classification.

QUESTION 18

Information may be classified if it is owned by the U.S. Government, its unauthorized disclosure could embarrass the Government but not harm national security, and it concerns failed scientific research.

ANSWER

False

QUESTION 19

Which of the following is a valid reason to classify information?

ANSWER

To protect national security

QUESTION 20

All of the following are ways to promote the sharing of information within the Federal government, across state, local, and tribal governments, and with coalition partners, law enforcement, and the general public EXCEPT:

ANSWER

Automatically declassify information that is shared

QUESTION 21

Cleared contractor employees are subject to sanctions for violating any policies in the National Industrial Security Program Operating Manual (NISPOM).

ANSWER

True

QUESTION 22

Mark reveals a small piece of classified information regarding a project he's working on during conversation with a friend. He will not be subject to sanctions, as it was only a small piece of information and he knows the person he gave the information to.

ANSWER

False

QUESTION 23

Select ALL the correct responses. Which of the following are administrative sanctions?

ANSWER

Revocation of security clearance // Suspension without pay

QUESTION 24

If you suspect information has been improperly or unnecessarily classified, what should you do first?

ANSWER

Discuss your concerns with your security manager or supervisor.

QUESTION 25

The properly marked source document states:(C) The training exercise will last three days.(S) The training exercise will begin 21 April. The Security Classification Guide (SCG) states:The length of the training exercise is Confidential. The dates of the training exercise are Secret. The new document states:( ) The training exercise lasts three days, ending on 24 April. What is the classification of the statement in the new document?

ANSWER

Secret

QUESTION 26

The properly marked source document states:(S) There will be 80,000 troops deployed to Ilkeborg. The new document states:(S) Forty-thousand troops will approach Ilkeborg from the west, and another 40,000 will approach from the east. What concept is used to derivatively classify the statement in the new document?

ANSWER

Revealed by

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials