Sensitive Compartmented Information (SCI) Security Refresher

13 October 2022
4.7 (114 reviews)
100 test answers

Unlock all answers in this set

Unlock answers (96)
question
A security violation involves the loss, compromise, or suspected compromise of classified information. Security violations must be reported.
answer
true
question
You are required to report all foreign travel prior to departure, including day trips to Canada and Mexico.
answer
false
question
When you signed the SCI NdS, you agreed that anything you gained from unauthorized disclosure of SCI would become the property of the United States Government.
answer
true
question
Walls in SCIFs must extend from true floor to true ceiling.
answer
true
question
An SCI document that contains the dissemination control marking NOFORN indicates this document ___________________________________.
answer
a. Is not releasable to foreign nationals
question
You must report external activist groups you or your co-workers are affiliated with regardless of their nature.
answer
true
question
Visitors may enter a SCIF without a visitor certification if they are escorted by indoctrinated personnel.
answer
true
question
If the ISSO permits it, you may share your password in a SCIF.
answer
false
question
The access control system for unattended SCIF entry must use ____________________ and _______________________ such as an access card and personal identification number (PIN).
answer
b. Authentication, verification
question
SCI couriers must be appointed __________, have a signed letter of authorization and know the rules and regulations governing couriers and transporting classified material.
answer
in writing
question
In a SCIF, SCI must always be stored in a GSA-approved container.
answer
false
question
After setting the alarm on a SCIF, spinning the lock, and displaying the closed sign, you must complete the _____________________ form
answer
b. SF-701 NOT correct
question
Which is the primary database used to verify personnel access to SCIFs outside DoD?
answer
b. Joint Personnel Adjudication System (JPAS) NOT CORRECT
question
If a SCIF has a high security lock, then an access control system is not required.
answer
false
question
The SCI control system marking should not be listed in the banner line on a classified document.
answer
false
question
_____________ is technically derived intelligence data other than imagery and signals intelligence that locates, identifies, or describes distinctive characteristics of targets.
answer
f. Measurement and Signature Intelligence (MASINT)
question
What piece of information is not required to be recorded on the SCIF visitor control log?
answer
f. Visitor's date of birth
question
The three primary types of SCIFs are referred to as closed storage SCIF, open storage SCIF, and ___________________.
answer
a. Continuous Operation SCIF
question
You must report any systemic weaknesses and anomalies.
answer
true
question
When closing a closed storage SCIF you must ensure all classified material has been stored, security containers are closed and locked, locked sign is displayed on security containers, and the SF-701 form is completed.
answer
true
question
SCI is required to be stored in a GSA-approved container in a Closed Storage SCIF.
answer
true
question
One company must be responsible for the installation, maintenance, and monitoring of the Intrusion Detection System (IDS) for SCIFs.
answer
true
question
SCI Material cannot be stored in _________________________________.
answer
b. An open storage SCIF (WRONG)
question
_____________ uses imagery, imagery intelligence, or geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the earth.
answer
b. Imagery Intelligence (IMINT) (WRONG)
question
Which of the following is the preferred method for transporting an SCI document from one SCIF to another?
answer
a. Defense Courier Service (DCS)
question
IS components, media, and/or memory may be brought into a SCIF and removed from a SCIF if it has been properly logged and approved by the __________________________.
answer
c. Special Security Officer (SSO) or Information Systems Security Officer (ISSO)
question
Which of the following is an escort in a SCIF not required to do?
answer
d. Process the visitor certifications for their visitors
question
You've noticed that Sydney has been very unhappy and disgruntled at work lately in the SCIF. You are required to report this information about Sydney.
answer
true
question
How long must SCIF visitor control logs be retained?
answer
. 1 year after the last entry
question
Sensitive Compartmented Information (SCI) is ______________________.
answer
c. Classified national intelligence information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems
question
You are not required to report adverse information about others who also have SCI access. You are only required to report adverse information about yourself.
answer
false
question
The ___________________________ processes SCIF visitor certifications.
answer
b. Special Security Officer (SSO) or Special Security Representative (SSR)
question
_____________ includes representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media which is derived from visual photography, radar sensors, and electro-optics.
answer
c. Imagery Intelligence (IMINT)
question
SCI material is not required to be stored in a GSA-approved container in an open storage SCIF.
answer
true
question
Which SCI control system is designed to protect imagery intelligence?
answer
a. TALENT KEYHOLE (TK)
question
When you signed the _______________, you acknowledged that you were advised that mishandling SCI could cause irreparable harm to the United States and you are obligated not to disclose SCI to anyone who is not authorized to receive it.
answer
a. SCI NdS
question
Current SCI control systems are HCS, SI, and ________________.
answer
a. TALENT KEYHOLE
question
A French citizen you met at a party has taken a strong interest in finding out more about your employment. Because you do not return his phone calls, however, this is not considered a foreign contact that must be reported.
answer
false
question
Who provides construction and security requirements for SCIFs?
answer
a. Defense Intelligence Agency (DIA) WRONG
question
Who is responsible for terminating SCI access?
answer
. Special Security Officer (SSO), or designee WRONG
question
_____________ is the collection of intelligence through public sources.
answer
a. Open Source Intelligence (OSINT)
question
Who heads the Intelligence Community (IC)?
answer
c. Director of National Intelligence
question
You must consult your SCIF's ____________to learn what you are or are not permitted to tell your family members about your work location and mission.
answer
b. ISSO WRONG
question
SCI control systems are additional measures used to protect intelligence sources and methods or analytical procedures that are beyond those used to protect non-SCI classified information.
answer
true
question
When you sign the SCI Nondisclosure Statement (NdS), you are ________________________.
answer
b. Making a lifelong commitment to protect U. S. Government classified intelligence information
question
You should never connect classified and unclassified systems together.
answer
true
question
Equipment used to destroy SCI paper materials must be listed in the ___________________________________________________________.
answer
c. NSA Evaluated Products List of High Security Crosscut Paper Shredders
question
You are required to remove your name badge as soon as you leave your SCIF so as not to call attention to yourself.
answer
true
question
When you signed the SCI NdS, you acknowledged that this agreement will last until you retire or separate from the Federal Government, unless you are released in writing by an authorized representative of the department or agency that last granted you with access to SCI.
answer
false
question
Walls within a SCIF require acoustical protection measures and sound masking systems to protect SCI.
answer
true
question
SCIF windows must be secured at ground level and up to _____________ above ground level.
answer
18 feet
question
In a SCIF, SCI must always be stored in a GSA-approved container.
answer
false
question
You are permitted to discuss SCI outside your SCIF as long as it is with one of your SCIF co-workers.
answer
false
question
For access to SCIFs during business hours, cipher locks may be used for high security areas and compartments.
answer
true
question
SCI is required to be stored in a GSA-approved container in a Closed Storage SCIF.
answer
true
question
SCI Material cannot be stored in _________________________________.
answer
c. An open storage SCIF (WRONG)
question
SCI material must be _____________________ prior to giving the package to the courier.
answer
double wrapped
question
Which of the following is true about escorts in SCIFs
answer
c. Only personnel assigned to the SCIF are authorized to escort non-indoctrinated or contractor personnel within the government area.
question
In a SCIF, reproduction equipment must display a sign indicating the highest level of classification allowed to be reproduced on that equipment
answer
true
question
You placed a For Sale ad in the local newspaper in an attempt to sell your old car. Because this involves contact with the media, you are required to report it.
answer
false
question
Equipment leaving latent images on itself or on other material or that has the capability to connect to remote diagnostic centers, such as by telephone line, is prohibited for classified reproduction.
answer
true
question
____________ is the collection of intelligence through public sources.
answer
a. Human Intelligence (HUMINT) (WRONG)
question
Visitors who are not certified may access classified information as long as their affiliation or position warrants it.
answer
false
question
Copies of classified documents are not subject to the same control, accountability, and destruction procedures as the original document.
answer
false
question
You are required to have a pre-publication review of any material you create based on your access to classified information before it enters _______________.
answer
b. The public domain
question
The SCIF Fixed Facility Checklist is used to obtain SCIF accreditation.
answer
true
question
_____________ is technically derived intelligence data other than imagery and signals intelligence that locates, identifies, or describes distinctive characteristics of targets.
answer
c. Measurement and Signature Intelligence (MASINT)
question
When you signed the SCI NdS, you gave up protection under the Whistleblower Protection Act
answer
false
question
You should never connect classified and unclassified systems together.
answer
true
question
We use classification management to determine the nature of information and assign proper classification markings, SCI control system markings, dissemination controls, and declassification instructions.
answer
true
question
Security violations are required to be reported, but infractions are not required to be reported.
answer
false
question
Christopher works in a SCIF and is having an Internet relationship in a chat room (outside of work hours) with a woman who is not a U.S. citizen. Christopher is required to report this relationship.
answer
true
question
What piece of information is not required to be recorded on the SCIF visitor control log?
answer
visitors birth date
question
_____________ is the collection of intelligence using human sources such as diplomats, military attaches, and spies.
answer
b. Open Source Intelligence (OSINT)
question
_____________ is the collection of verbal and nonverbal signals from land, sea, and satellite. These signals are protected within the Communications Intelligence, (COMINT) SCI control system.
answer
. Geospatial Intelligence (GEOINT) (WRONG)
question
Equipment used to destroy SCI paper materials must be listed in the ___________________________________________________________.
answer
b. NSA Evaluated Products List of High Security Crosscut Paper Shredders
question
Destruction of SCI must be conducted by SCI indoctrinated personnel.
answer
true
question
Which SCI control system is designed to protect signals intelligence including communications intelligence and electronic intelligence?
answer
c. HCS (HCS) (wrong)
question
You must report any systemic weaknesses and anomalies.
answer
True
question
Which of the following statements is correct?
answer
c. You must report any part-time employment (WRONG)
question
The DNI issued several _________________ and ________________ which provide security policy for the protection of national intelligence as well as the personnel security requirements for access to SCI, and physical and technical security requirements for SCIFs.
answer
c. Intelligence Community Directives, Intelligence Community Policy Guidance documents
question
Jill works in a SCIF. Jill is party to a malpractice lawsuit. Jill is required to report this legal involvement.
answer
True
question
Spills are deliberate unauthorized disclosures of classified information to the media whereas leaks are accidental or intentional unauthorized disclosures of classified information across computer systems.
answer
False
question
When you signed the SCI NdS, you acknowledged that any breach of this agreement could result in the termination of your SCI access and your employment as well as prosecution of you under U.S. criminal laws.
answer
true
question
Which of the following is not a requirement of a secure telephone system in a SCIF?
answer
c. Detects attempted or actual unauthorized human entry into a SCIF
question
____________________is required to access certain areas of a SCIF and classified information.
answer
a. Need-to-know
question
Who provides accreditation for DoD SCIFs
answer
b. Defense Intelligence Agency (DIA)
question
Visitors who have a visitor certification do not require an escort.
answer
false
question
John has access to SCI and is currently legally separated from his wife. John is required to report his se
answer
true
question
SCI is one of eight categories of information that require classified protection as outlined in Executive Order 13526.
answer
true
question
If a SCIF has a high security lock, then an access control system is not required.
answer
false
question
Walls in SCIFs must extend from true floor to true ceiling.
answer
true
question
SI is the SCI control system marking abbreviation for which SCI control system?
answer
b. TALENT KEYHOLE (WRONG)
question
The biggest vulnerability in SCIF forced entry is the ____________________.
answer
a. Emergency exit doors
question
You signed an SCI Nondisclosure Statement during the __________________ process.
answer
Debriefing (WRONG)
question
You are required to report suspicious co-worker activities
answer
True
question
All Sensitive Compartmented Information Facilities (SCIFs) can be used to store Sensitive Compartmented Information (SCI).
answer
False
question
Which SCI control system is designed to protect human intelligence?
answer
c. TALENT KEYHOLE (TK) (WRONG)
question
Walls within a SCIF require acoustical protection measures and sound masking systems to protect SCI.
answer
true
question
Jim works in a SCIF. Jim got drunk and passed out in a bar over the weekend. Jim is required to report this incident.
answer
true