JKO / JointAnswer Key

Infosec Army Jko

20 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

If an individual inserts a thumb drive containing classified information on a computer in the office that is not part of the classified information system, what type of security incident is this?

ANSWER

Spillage - correct

QUESTION 2

When information, in the interest of national security, no longer requires protection at any level, it should be:

ANSWER

Declassified - correct

QUESTION 3

Where do the reasons for classifying certain items, elements or categories of information originally come from?

ANSWER

Executive Order 12526 - Correct

QUESTION 4

In which order must documents containing classified information be marked?

ANSWER

Portion markings, banner markings, classification authority block - correct

QUESTION 5

What information do security classification guides (SCG) provide about systems, plans, programs, projects, or missions?

ANSWER

all of the above -correct

QUESTION 6

What information is listed in the classification authority block on a document containing classified information? Select all that apply.

ANSWER

(ANSWER UNKNOWN) - Who created the classified document - Current classification level of the document - Classification level to downgrade to at a certain point in time (as applicable) - Which source the information in the document was derived from - Date on which to declassify the document

QUESTION 7

What is required to access classified information? Select all that apply.

ANSWER

-Eligibility - correct -Need-to-know - correct -Signed SF-312, Nondisclosure Agreement - correct

QUESTION 8

The unauthorized disclosure of this type of information could reasonably be expected to cause serious damage to our national security.

ANSWER

Secret - correct

QUESTION 9

When classified information is in an authorized individual's hands, why should the individual use a classified document cover sheet? Select all that apply.

ANSWER

-To prevent inadvertent viewing of classified information by unauthorized personnel - correct -To alert holders to the presence of classified information - correct

QUESTION 10

The unauthorized disclosure of Top Secret information could reasonably be expected to cause _______________ to our national security.

ANSWER

Exceptionally grave Damage - correct

QUESTION 11

What are the authorized places for storing classified information? Select all that apply.

ANSWER

(ANSWER UNKNOWN) -In information technology systems authorized for classified information -In an authorized individual's head or hands -In an authorized individual's locked desk drawer -In a GSA-approved security container

QUESTION 12

What type of declassification process is a way for members of the public to request the review of specific classified information?

ANSWER

Mandatory Declassification Review - correct

QUESTION 13

____________________occurs in some circumstances when information that is individually unclassified, or classified at a lower level, may be classified, or classified at a higher level, only if the combined information reveals an additional association or relationship.

ANSWER

Compilation - correct

QUESTION 14

What are the steps of the information security program lifecycle?

ANSWER

Classification, safeguarding, dissemination, declassification and destruction - correct

QUESTION 15

What is the first step an Original Classification Authority (OCA) must take when originally classifying information?

ANSWER

Determine if the information is official government information. - correct

QUESTION 16

Which level of classification information may be transported via USPS mail? Select all that apply.

ANSWER

-Secret - correct -confidential - correct

QUESTION 17

Whose guidelines should you follow for the destruction of storage media as thumb drives, zip drives, and computers?

ANSWER

National Security Agency - Correct

QUESTION 18

Who has responsibility for the overall policy direction of the information Security Program?

ANSWER

Director of the Information Security Oversight Office (ISOO) - correct

QUESTION 19

Requests for waivers and exceptions must identify the specific provision or provisions of the _____________ for which the waiver or exception is sought.

ANSWER

DoD Information Security Manual - correct

QUESTION 20

If an individual fails to secure the Sensitive Compartmented Information Facility (SCIF) at the end of the day and, subsequently, unescorted cleaning personnel access the SCIF and see classified information, what type of security incident is this?

ANSWER

Security Violation - correct

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials