Miscellaneous Security Measures Destruction Transmit/Transport Reporting Security Incidents Safeguards
100
AF Form 143
Top Secret documents are transferred using what document?
100
Top Secret
Which classification level requires two persons to perform destruction?
100
Top Secret
What type of classified information requires direct contact (face to face) as a method for transmit/transport?
100
Security Violation
What is a violation of security program standards that could reasonably be expected to result in unauthorized disclosure of classified information?
100
SF 701 (Activity Security Checklist)
What form is used to record end of day security checks?
200
AF Form 1565
What form is used to document entry, receipt and destruction of classified page changes?
200
Cross-Cut Shredding
What is the most common method for destroying classified material?
200
Confidential
What type of classified information can use the U.S. Postal Service First Class mail using "Return Service Requested" as a transmit/transport method?
200
Wing Information Protection (IP) Office
What agency/office is responsible for investigating security incidents? (security incidents must be reported to this agency/office)
200
AF Form 144
What cover sheet is used for TS information and also serves as a record of access to the information and must be signed by each person the first time they access the document?
300
AF 310
What form would you use to transfer a Secret or Confidential document?
300
Burning, Melting/Chemical Decomposition, Pulverizing, Wet-Pulping, and Mutilating
Excluding cross-cut shredding, name three other methods of destruction.
300
Secret and Confidential
What type of classified information can use GSA approved contracted overnight delivery within the U.S. Territories?
300
Security Infraction
This security incident is any knowing, willful, or negligent security action that does not constitute a security violation.
300
SF 705
What cover sheet is used for Confidential information?
400
Quick Reaction Checklist (QRC)
CP Controllers will initiate a ___ upon notification of a security incident, violation, or compromise.
400
Mutilating
What method of destruction requires you to alter radically by defacing material beyond recognition (e.g. destroy with sledge hammer or axe)?
400
Top Secret, Secret, and Confidential
What type of classified information can use the Defense Courier Service (DCS) as a method of transmit/transport?
400
Compromise
This occurs when an unauthorized individual has had access to classified information as a result of a security violation or infraction.
400
SF 704
What cover sheet is used for Secret information






Controlling Classified Material

Press F11 for full screen mode



Limited time offer: Membership 25% off


Clone | Edit | Download / Play Offline