Miscellaneous Security Measures | Destruction | Transmit/Transport | Reporting Security Incidents | Safeguards |
---|---|---|---|---|
AF Form 143
Top Secret documents are transferred using what document?
|
Top Secret
Which classification level requires two persons to perform destruction?
|
Top Secret
What type of classified information requires direct contact (face to face) as a method for transmit/transport?
|
Security Violation
What is a violation of security program standards that could reasonably be expected to result in unauthorized disclosure of classified information?
|
SF 701 (Activity Security Checklist)
What form is used to record end of day security checks?
|
AF Form 1565
What form is used to document entry, receipt and destruction of classified page changes?
|
Cross-Cut Shredding
What is the most common method for destroying classified material?
|
Confidential
What type of classified information can use the U.S. Postal Service First Class mail using "Return Service Requested" as a transmit/transport method?
|
Wing Information Protection (IP) Office
What agency/office is responsible for investigating security incidents? (security incidents must be reported to this agency/office)
|
AF Form 144
What cover sheet is used for TS information and also serves as a record of access to the information and must be signed by each person the first time they access the document?
|
AF 310
What form would you use to transfer a Secret or Confidential document?
|
Burning, Melting/Chemical Decomposition, Pulverizing, Wet-Pulping, and Mutilating
Excluding cross-cut shredding, name three other methods of destruction.
|
Secret and Confidential
What type of classified information can use GSA approved contracted overnight delivery within the U.S. Territories?
|
Security Infraction
This security incident is any knowing, willful, or negligent security action that does not constitute a security violation.
|
SF 705
What cover sheet is used for Confidential information?
|
Quick Reaction Checklist (QRC)
CP Controllers will initiate a ___ upon notification of a security incident, violation, or compromise.
|
Mutilating
What method of destruction requires you to alter radically by defacing material beyond recognition (e.g. destroy with sledge hammer or axe)?
|
Top Secret, Secret, and Confidential
What type of classified information can use the Defense Courier Service (DCS) as a method of transmit/transport?
|
Compromise
This occurs when an unauthorized individual has had access to classified information as a result of a security violation or infraction.
|
SF 704
What cover sheet is used for Secret information
|