What is the second step upon discovery of an unauthorized disclosure (ud) incident?

Unauthorized disclosure is the communication or physical transfer of classified information or controlled unclassified information (CUI) to an unauthorized recipient.
True

An individual with access to classified information sent a classified email across a network that is not authorized to process classified information. Which type of unauthorized disclosure has occurred?
Data Spill

An individual with access to classified information sells classified information to a foreign intelligence entity. This is an example of which type of unauthorized disclosure?
Espionage

Journalist privilege _______________________ who disclose classified information or controlled unclassified information (CUI) to a reporter or journalist.
will not protect employees

How long is your Non-Disclosure Agreement (NDA) applicable?
For a lifetime

If classified information or controlled unclassified information (CUI) has been put in the public domain, then it is okay for employees to freely share it.
False

__________________ relates to reporting of gross mismanagement and/or abuse of authority.
Whistleblower Protection Enhancement Act (WPEA)

The Whistleblower Protection Enhancement Act (WPEA) is an avenue for reporting the unauthorized disclosure of classified information and controlled unclassified information (CUI).
False

Which of the following are some tools needed to properly safeguard classified information?
All of the above

Authorized holders must meet the requirements to access ____________ in accordance with a lawful government purpose: Activity, Mission, Function, Operation, and Endeavor. Select all that apply.
Controlled Unclassified Information (CUI)

Which best describes original classification?
The initial determination information needs protection

Sarah is a contractor working within the government on a contract requiring access to Secret information. Which of the following must she have to meet the requirement to access classified information?
All of the above

In addition to military members and federal civilian employees those who work in ______________ should send resumes and cover letters for security review.
special programs

As a military member or federal civilian employee, it is a best practice to ensure your current or last command conduct a security review of your resume and ____.
cover letter

A retired service member has just written an article on his last tour of duty for his hometown newspaper. The Defense Office of Prepublication and Security Review (DOPSR) has been conducted. What else must he do before releasing the article to the newspaper?
Contact the Public Affairs Office (PAO) for a review of public affairs specific considerations.

The requirements for protecting classified information from unauthorized disclosure when using social networking services are the same as when using other media and methods of dissemination.
True

Tonya Rivera was contacted by a news outlet with questions regarding her work. To whom should Tonya refer the media?
Facility Security Officer (FSO)

One of your co-workers, Yuri, found classified information on the copy machine next to your cubicles. Yuri began questioning surrounding co-workers to see if anyone had left the documents unattended. Is Yuri following DoD policy?
No, Yuri must safeguard the information immediately.

Jane Johnson found classified information in the office breakroom. What should be her first action?
Secure the information in a GSA-approved security container

The prevention of serious security incidents is a responsibility ______________.
shared by all DoD personnel

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Security Manager

Terms in this set (20)

An authorized recipient must meet which requirements to access classified information? Select all that apply.

- Posses a signed NDA
- Have a need to know

An individual with access to classified information sells classified information to a foreign intelligence entity. This is an example of which type of unauthorized disclosure?

Espionage

_________________ is a type of unauthorized disclosure involving activities designed to obtain, deliver, communicate, or transmit classified information or controlled unclassified information (CUI) intended to aid a foreign power.

Espionage

Journalist privilege _______________________ who disclose classified information or controlled unclassified information (CUI) to a reporter or journalist

will not protect everyone

Which of the following is a misconception? (Select all that apply)

-. Classified information or controlled unclassified information (CUI) appearing in the public domain may be freely shared.
-. Manuscripts, books, and articles can be submitted to an editor or publisher before undergoing a Defense Office of Prepublication Review (DOPSR) security review.

How long is your Non-Disclosure Agreement (NDA) applicable?

for a lifetime

__________________ relates to reporting of gross mismanagement and/or abuse of authority.

WEPA

The Whistleblower Protection Enhancement Act (WPEA) relates to reporting all of the following except?

Classified information or controlled unclassified information (CUI) in the public domain

Which best describes derivative classification?

Marking newly-developed material consistent with classification markings applied to the source information

Which of the following are some tools needed to properly safeguard classified information?

All the above

Jamal is using a security classification guide (SCG) to assist in marking information from a source document. Which best describes Jamal's work?

Derivative Classification

When destroying or disposing of classified information, you must ____________.

follow appropriate guidelines

Many different types of personnel work with classified information. Which of the following must submit their work for prepublication review? Select all that apply.

a. Government civilian employees
b. Contractor personnel
c. Retirees
d. Military personnel

Resumes and cover letters can be sent to _________ for security review.

the military member or federal civilian employee's command

Before releasing information to the public domain it what order must it be reviewed?

local command, security manager, and then Defense Office of Prepublication and Security Review (DOPSR

When using social networking services, the penalties for ignoring requirements related to protecting classified information and controlled unclassified information (CUI) from unauthorized disclosure are _______________________________________.

the same as when using other media and methods of dissemination

Tonya Rivera was contacted by a news outlet with questions regarding her work. To whom should Tonya refer the media?

FSO

If you have discovered unsecured classified information, you must report it to your local security manager or ___.

FSO

What is the second step upon discovery of an unauthorized disclosure (UD) incident?

Report

One of your co-workers, Yuri, found classified information on the copy machine next to your cubicles. Yuri began questioning surrounding co-workers to see if anyone had left the documents unattended. Is Yuri following DoD policy?

No, Yuri must safeguard the information immediately.

Sets with similar terms

SFCP: Information Security

54 terms

SpinMe

SFPC

60 terms

lrice1318

Administration Block 3 Unit 2 a.-b.

103 terms

latanya_tidwell

DoD INFORMATION SECURITY

74 terms

bweaver639

Sets found in the same folder

unauthorized disclosure of classified information…

39 terms

anotherdaywithkk

Unauthorized Disclosure

16 terms

phil_collar

Disclosure of classified information and unclassif…

19 terms

Lesley_Floyd3

Army OPSEC level 1 (Newcomers & Refresher)

29 terms

elsieteel

Other sets by this creator

SAP Refresher SA002.06.FY21

30 terms

txgurl3

DoD Mandatory Controlled Unclassified Info. (CUI)…

15 terms

txgurl3

SAP Roles and Responsibilities

10 terms

txgurl3

Sensitive Compartmented Information Training

2 terms

txgurl3

Verified questions

ADVANCED MATH

Consider an M/G/1/GD/∞/∞ queuing system in which an average of 10 arrivals occur each hour. Suppose that each customer’s service time follows an Erlang distribution, with rate parameter 1 customer per minute and shape parameter 4. a. Find the expected number of customers waiting in line. b. Find the expected time that a customer will spend in the system. c. What fraction of the time will the server be idle?

Verified answer

ADVANCED MATH

For an M/M/1/GD/∞/∞ queuing system, suppose that both λ and μ are doubled. a. How is L changed? b. How is W changed? c. How is the steady-state probability distribution changed?

Verified answer

ADVANCED MATH

Without performing the divisions, determine whether the integer 1010908899 is divisible by 7, 11, and 13.

Verified answer

ADVANCED MATH

Criticize the following definitions in light of the eight rules for lexical definitions: A carpenter’s square is a square used by a carpenter.

Verified answer

Recommended textbook solutions

What is the second step upon discovery of an unauthorized disclosure (ud) incident?

Book of Proof

2nd EditionRichard Hammack

340 solutions

What is the second step upon discovery of an unauthorized disclosure (ud) incident?

Numerical Analysis

9th EditionJ. Douglas Faires, Richard L. Burden

873 solutions

What is the second step upon discovery of an unauthorized disclosure (ud) incident?

Elementary Number Theory

7th EditionDavid Burton

776 solutions

What is the second step upon discovery of an unauthorized disclosure (ud) incident?

Elementary Differential Geometry

2nd EditionBarrett O'Neill

297 solutions

Other Quizlet sets

ECHO diastolic dysfunction

14 terms

ping_whitePLUS

Law & Order: Special Victims Unit

35 terms

jamyadorsey11

Swimming Creatures, Lesson 4A

20 terms

MsShayna

Skin, Connective Tissue, Muscles

31 terms

Jack_Ballard2

Related questions

QUESTION

If a physician documents in the patient's record the level of Medical Decision Making (MDM) as straightforward, low, moderate, or high complexity, that is sufficient to warrant the appropriate level of decision making.

2 answers

QUESTION

In critiquing social information processing theory, critics have argued that the soc... to broad, but it has utility:

2 answers

QUESTION

Why is it a good idea to read through an application before starting to fill it out?

10 answers

QUESTION

The chargemaster relieves the coders from coding repetitive services that require little, if any, formal documentation analysis. This is called

15 answers

What is UD on CUI?

Unauthorized Disclosure (UD) of Classified Information and Controlled Unclassified Information (CUI) IF130. 16 - CDSE. April 9, 2022. Unauthorized disclosure is the communication or physical transfer of classified information or controlled unclassified information (CUI) to an unauthorized recipient.

What is unauthorized disclosure of classified information?

As defined in DoDM 5200.01, Volume 3, DoD Information Security Program, unauthorized disclosure is the communication or physical transfer of classified or controlled unclassified information to an unauthorized recipient.

Where do you report an unauthorized disclosure?

Reporting Unauthorized Disclosure If you see or suspect unauthorized disclosure, first take steps to protect the classified information. Then report to your organization's security officer. If you are a DOD employee, report the incident to your security manager.

Which of the following types of UD involve the transfer of classified information?

Answer: The correct type of UD is “public domain.” Answer: Data spills are the transfer of classified information or CUI onto an information system not authorized at the appropriate security level or having the required CUI protection.