Who disclose classified information or controlled unclassified information CUI to a reporter or journalist?

Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Security Manager

Terms in this set (20)

An authorized recipient must meet which requirements to access classified information? Select all that apply.

- Posses a signed NDA
- Have a need to know

An individual with access to classified information sells classified information to a foreign intelligence entity. This is an example of which type of unauthorized disclosure?

Espionage

_________________ is a type of unauthorized disclosure involving activities designed to obtain, deliver, communicate, or transmit classified information or controlled unclassified information (CUI) intended to aid a foreign power.

Espionage

Journalist privilege _______________________ who disclose classified information or controlled unclassified information (CUI) to a reporter or journalist

will not protect everyone

Which of the following is a misconception? (Select all that apply)

-. Classified information or controlled unclassified information (CUI) appearing in the public domain may be freely shared.
-. Manuscripts, books, and articles can be submitted to an editor or publisher before undergoing a Defense Office of Prepublication Review (DOPSR) security review.

How long is your Non-Disclosure Agreement (NDA) applicable?

for a lifetime

__________________ relates to reporting of gross mismanagement and/or abuse of authority.

WEPA

The Whistleblower Protection Enhancement Act (WPEA) relates to reporting all of the following except?

Classified information or controlled unclassified information (CUI) in the public domain

Which best describes derivative classification?

Marking newly-developed material consistent with classification markings applied to the source information

Which of the following are some tools needed to properly safeguard classified information?

All the above

Jamal is using a security classification guide (SCG) to assist in marking information from a source document. Which best describes Jamal's work?

Derivative Classification

When destroying or disposing of classified information, you must ____________.

follow appropriate guidelines

Many different types of personnel work with classified information. Which of the following must submit their work for prepublication review? Select all that apply.

a. Government civilian employees
b. Contractor personnel
c. Retirees
d. Military personnel

Resumes and cover letters can be sent to _________ for security review.

the military member or federal civilian employee's command

Before releasing information to the public domain it what order must it be reviewed?

local command, security manager, and then Defense Office of Prepublication and Security Review (DOPSR

When using social networking services, the penalties for ignoring requirements related to protecting classified information and controlled unclassified information (CUI) from unauthorized disclosure are _______________________________________.

the same as when using other media and methods of dissemination

Tonya Rivera was contacted by a news outlet with questions regarding her work. To whom should Tonya refer the media?

FSO

If you have discovered unsecured classified information, you must report it to your local security manager or ___.

FSO

What is the second step upon discovery of an unauthorized disclosure (UD) incident?

Report

One of your co-workers, Yuri, found classified information on the copy machine next to your cubicles. Yuri began questioning surrounding co-workers to see if anyone had left the documents unattended. Is Yuri following DoD policy?

No, Yuri must safeguard the information immediately.

Sets with similar terms

SFCP: Information Security

54 terms

SpinMe

SFPC

60 terms

lrice1318

Administration Block 3 Unit 2 a.-b.

103 terms

latanya_tidwell

DoD INFORMATION SECURITY

74 terms

bweaver639

Sets found in the same folder

unauthorized disclosure of classified information…

39 terms

anotherdaywithkk

Unauthorized Disclosure

16 terms

phil_collar

Disclosure of classified information and unclassif…

19 terms

Lesley_Floyd3

Marking Classified Information IF105

61 terms

badcheater

Other sets by this creator

SAP Refresher SA002.06.FY21

30 terms

txgurl3

DoD Mandatory Controlled Unclassified Info. (CUI)…

15 terms

txgurl3

SAP Roles and Responsibilities

10 terms

txgurl3

Sensitive Compartmented Information Training

2 terms

txgurl3

Verified questions

ADVANCED MATH

Consider an M/G/1/GD/∞/∞ queuing system in which an average of 10 arrivals occur each hour. Suppose that each customer’s service time follows an Erlang distribution, with rate parameter 1 customer per minute and shape parameter 4. a. Find the expected number of customers waiting in line. b. Find the expected time that a customer will spend in the system. c. What fraction of the time will the server be idle?

Verified answer

ADVANCED MATH

For an M/M/1/GD/∞/∞ queuing system, suppose that both λ and μ are doubled. a. How is L changed? b. How is W changed? c. How is the steady-state probability distribution changed?

Verified answer

ADVANCED MATH

Without performing the divisions, determine whether the integer 1010908899 is divisible by 7, 11, and 13.

Verified answer

ADVANCED MATH

Criticize the following definitions in light of the eight rules for lexical definitions: A carpenter’s square is a square used by a carpenter.

Verified answer

Other Quizlet sets

ECHO diastolic dysfunction

14 terms

ping_whitePLUS

Law & Order: Special Victims Unit

35 terms

jamyadorsey11

Swimming Creatures, Lesson 4A

20 terms

MsShayna

Skin, Connective Tissue, Muscles

31 terms

Jack_Ballard2

Related questions

QUESTION

If a physician documents in the patient's record the level of Medical Decision Making (MDM) as straightforward, low, moderate, or high complexity, that is sufficient to warrant the appropriate level of decision making.

2 answers

QUESTION

In critiquing social information processing theory, critics have argued that the soc... to broad, but it has utility:

2 answers

QUESTION

Why is it a good idea to read through an application before starting to fill it out?

10 answers

QUESTION

The chargemaster relieves the coders from coding repetitive services that require little, if any, formal documentation analysis. This is called

15 answers

Is classified information or controlled unclassified information is in the public domain?

This is false! Even though classified information or CUI appears in the public domain, such as in a newspaper or on the Internet, it is still classified or designated as CUI until an official declassification decision is made, or in the case of CUI, it is no longer designated as such.

When classified information or CUI appear in books journals print articles Internet based articles etc this is considered what type of UD?

Answer: The correct type of UD is “public domain.” Answer: Data spills are the transfer of classified information or CUI onto an information system not authorized at the appropriate security level or having the required CUI protection.

What is the very first thing you must do when you discover or suspect unauthorized disclosure of classified information?

Once you discover or suspect unauthorized disclosure, you must first protect the classified information to prevent further unauthorized disclosure. Then you must report the unauthorized disclosure to the appropriate authorities who will, in turn, investigate the incident and impose sanctions, if warranted.

What occurs when classified information or controlled unclassified information is transferred?

a. A spillage occurs whenever classified information or CUI is transferred onto an information system not authorized for the appropriate security level or not having the required CUI protection or access controls.