Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CP Security

Information / Cryptographic / Physical Security

QuestionAnswer
Define official information? Info owned by, produced by, or controlled by the US government.
Name the two groups of official information? (1) Classified (2) Unclassified
What are the three prerequisites in disseminating classified defense information? (1) NTK (2) Security clearance (3) Proper Identification
Who should you ask if you are in doubt as to whether or not someone is eligible for access to classified information? Your supervisor.
How are categories of classified items established? According to their degree of importance.
What are the three categories of classified information? (1) Top Secret (2) Secret (3) Confidential
Define Top Secret? National security info or material that requires the highest degree of protection. Unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to national security.
Define Secret? National security info that requires substantial degree of protection. Unauthorized disclosure could reasonably be expected to cause serious damage damage to national security.
Define Confidential? National security info that requires protection. Unauthorized disclosure could reasonably be expected to cause identifiable damage to national security.
Define EFTO? Unclas info that doesn't qualify for secret classification but still needs some protection during the transmission process.
Define SPECAT? Classified messages ID with a special project or subject.
NC2-ESI stands for what? Nuclear command and control-extremly sensitive information.
Define controlled unclassified information? Controlled unclas info is official info that doesn't require the application of security safeguarding, but the disclosure of which may be subject to control for other reasons.
What does FOUO mean? For Official Use Only.
Explain "possible intelligence value"? All classified info is of possible intelligence value. unclas info that, when associated with other unclas info, reveals an insight into classified plans, programs, or operations become of possible intelligence value.
What should you do if you can not decide whether a pice of unclassified information you are about to revel is of possible intelligence value? Don't reveal the information.
Describe the markings that every classified document must bear on its face? Overall classification, downgrading and declassification markings, office of origin, source of classification and date of preparation.
What are the symbols used to identify the classification assigned to a paragraph, section, or part of a document? (1) TS for Top Secret (2) S for Secret (3) C for Confidential (4) U for Unclassified
What is the purpose of using portion markings? To clearly identify the information that requires protection and to prevent the over-classification or misclassification of information.
Can the subject or title of a classified document be classified? Yes, if necessary. However select unclassified subjects and titles, if possible.
When classified information is upgraded, down graded, or declassified earlier than originally scheduled, it will be promptly and conspicuously marked to show the change. What other information is required? The authority for the action, the date of the action and the identity of the person taking the action.
In addition to the declassification instructions, what other means exist for determining continued classification requirements? Systematic and mandatory reviews.
What type of review is conducted when someone makes a specific request for classified information? Mandatory review.
What program operates to furnish official assurance that a person may be deemed trustworthy for access to classified information? USAF Personnel Security Program.
Who will develop and implement special measures to limit the dissemination of classified information? Commanders, office chiefs and supervisors.
How is a person's NTK determined? Personal knowledge of the individual or confirmation, either written o verbal, from the persons security manager, supervisor, or commander.
What is the first rule in controlling TS information? Document every action you take with TS documents.
What are the responsibilities of a TSCO? Receiving, dispatching and accounting for TS material for the organization served.
What is the purpose of the AF Form 143? To account for each TS document and each article of TS material received, originated, or dispatched by elements served by a TSCO.
What is the purpose of the AF Form 144? It IDs by name, grade, office symbol, phone number and date or each person who has had access to TS information.
What happens to the AF Form 144 when a TS document is transferred from one TS control account to another? It remains with the document.
What is the purpose of the TS inventor? To ensure all TS material is present and its status is correctly annotated on the AF form 143.
On what is the control system for Secret documents based? The limited use of receipts in transmitting documents between geographically separated units and maintaining certificates of destruction.
When must classified material be guarded or stored in a locked container? When its not under the personal control and observation of the controller.
What methods are used to store TS material? GSA approved container with at least one supplementary control.
What items will never be stored in containers that are used for storing classified materials? (1) Money (2) Weapons (3) Controlled drugs (4) Precious metals
How is a vault, safe, or container that contains classified information identified? An identifying number or symbol is affixed in a conspicuous location on the outside.
Is the combination of a vault or container used for the storage of classified material classified? Explain. Yes. It is assigned a security classification equal to the highest category of the classified material authorized to be stored in the container.
What is the primary responsibility of a custodian of classified material? Protecting and accounting for classified material at all times.
Which form is used to record he opening and closing of a safe that stores classified material? Standard Form 702
What form is used to record daily security checks? Standard Form 701
In terms of security once classified material is marked for destruction, what is likely to happen? There is a tendency to relax security.
What are the several methods of destruction of classified material? (1) Burning (2) Chemical decomposition (3) pulping (4) Pulverizing (5) Crosscut shredding (6) Mutilation
How many persons are required for the destruction of TS material? Two.
What types of Secret documents require a record of destruction? Limited categories of specially controlled Secret information.
How long are destruction certificates for Secret materials maintained? A minimum of two years
Give three examples of classified waste? Any three of the following: (1) Handwritten notes (2) Carbon paper (3) Typewriter ribbons (4) working papers
When does a security incident occur? When classified information or material is exposed to such an extents that viewing or analyzing by unauthorized persons may have occurred.
What is a security infraction? An incident that involves the misuse or improper handling of classified material but does not fall in the category of a security violation.
What is defined as the unauthorized disclosure of classified information to a persons not authorized access? Compromise.
What term is used to describe an incident where the compromise of classified information may have occurred? Possible compromise.
What is your responsibility relating to security violations? You must promptly report it to your immediate supervisor, security manager, or unit commander.
What three prerequisites must authorized persons have before you release classified material to them? (1) NTK (2) Proper security clearance (3) Proper credentials
In addition to those three prerequisites, what must be on file in the work center? Written authorization on file to release the information or material to that agency.
What markings are on an inner wrapper of classified material being sent outside the installation? Appropriate classification.
How many copies of classified information should be produced? Minimum consistent with mission requirements.
What classification of material always requires a receipt? TS
What are OPSEC vulnerabilities? Conditions in which friendly actions provide OPSEC indicators that may be obtained and accurately evaluated be and adversary in times to provide a basis for effective decision making?
Into what two groups are COMSEC material categorized? (1) COMSEC aids (2) Crypto equipment
What items are considered COMSEC aids? COMSEC materials, other than equipment or devices, that help to secure telecommunications and is needed to produce, operate, or maintain COMSEC systems and the components.
Who assigns ALCs to COMSEC material? The originating agency.
How does accountability differ between ALC 1 and ALC 2 material? ALC 1 material is inventoried by accounting control number while ALC 2 material is inventoried by quantity.
What ALC is assigned to hardcopy keying material that is not marked CRYPTO? ALC 4
What determines your COMSEC requirements? Your mission and the equipment you operate.
What information do you include on the COMSEC access list in a user facility? The names an clearance levels of all persons having COMSEC duties within a facility.
When is COMSEC issued? Unless there is a special circumstance, no earlier than 10 days prior to effective date.
When COMSEC inventories are conducted on a shift-to-shift basis, who must conduct the inventory? The oncoming shift.
With which inventory should you become most familiar? The daily / shift inventory
What are you certifying by initialing the COMSEC inventory? That all items on the inventory were present and accounted for.
When must used keying material designated CRYPTO be destroyed? Whenever possible, but no later than 12 hours after supersession.
Who is required to maintain an EA plan for hostile actions? All units outside of the continental US.
Whom should you notify if you become aware of a COMSEC incident? The nearest COMSEC manager or CRO
What are the types of COMSEC incidents? (1) Cryptographic (2) Personnel (3) Physical
List the four PLs in their order of importance. PL 1, 2, 3 and 4
What PL would be assigned to a limited or one of a kind weapon system? PL 2
Once a PL is assigned to a resource, can it be changed? Provide example supporting your answer? Yes. If a bomber ACFT is removed from alert status and is no longer has nuclear weapons on board, the PL is changed.
What security area temporarily place nonfederal lands under DOD control? A national defense area.
What legal and moral restrictions does a designated controlled area carry? The same as a physical barrier.
What is a free zone? Areas established within restricted or controlled area when construction projects and similar activities make it inappropriate or impractical to apply normal circulation controls.
Who controls entry into a CPs that are not authorized SF entry controllers? Person on duty in the CP.
What is the fundamental objective of any entry control technique? To establish the identity and verify the authority of each person seeking to enter a security area.
Is a single badge procedure considered adequate by itself for entry into a security area? Explain. No. By itself, any single badge entry technique can be defeated . When you use this technique, also use this technique, also use a supporting identification and verification technique.
For what types of entry procedures is the EAL a readily adaptable technique? The single badge procedure.
Describe the sign countersign system. the system will establish a sign that personnel will give in reply to another sign in order to pass through a security area.
What is a duress code? A word or phrase that can be fitted into normal conversation and used during emergencies to indicate that the person using the code is being held under duress.
What does the security report and alerting system defend against? Widespread coordinated threats.
On what factor(s) does the success of the security reporting and alerting system depend? The speed with which: bases initiate required reports, reports are relayed to MAJCOM HQ, HHQ analyze reports and down-channel alerting orders are relayed to base.
Define the term "covered wagon". When an unusual incident affecting PL 1, 2, or 3 resources has occurred at an installation because of actual or probable hostile actions
Who is responsible for submitting the voice covered wagon report to the AFSWC? MAJCOM
Which FPCON applies when an increased and more predictable threat of terrorist activity exists? FPCON Bravo
Which FPCON is normally issued as a localized warning? FPCON Delta
What program was deigned to frustrate terrorist attack planning? The RAM program
Define the term "helping hand". An unclassified telephone message sent to the CP to inform then that an unusual incident, possibly hostile and affecting PL 1, 2, or 3 resources, has been detected.
State the objective of the nuclear weapons PRP. To ensure that each person who preforms duties with nuclear weapons, nuclear weapons systems, or critical components meet the highest possible standards of individual reliability
What is the most important part of the nuclear weapons surety program? The individual
What concept should each organization that has a mission with nuclear weapons system enforce? Two-person concept
Names some examples of COMSEC aids. COMSEC keying material such as codes, key tapes, key lists, authenticators and so forth, marked CRYPTO.
Created by: czimpel
Popular Business sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards