This level of clearance is the lowest of the three main national security classifications
What is confidential?
This form is used to request a background investigation for a security clearance.
What is SF-86?
This marking indicates information that is unclassified but still requires protection.
What is CUI?
This type of container is commonly used to store classified documents.
What is a GSA-approved safe?
This program is designed to detect and prevent threats from individuals within an organization.
What is an Insider Threat Program?
This principle describes individuals only being given access to information necessary for their job.
What is Need-to-Know?
This system replaced JPAS and is now used to manage personnel security records.
What is DISS?
SECURITY PLUS POP QUIZ
This type of attack involves overwhelming a system with traffic to make it unavailable.
What is a Denial-of-Service attack?
SECURITY PLUS POP QUIZ
This security concept ensure that data has not been altered or tampered with.
What is integrity?
SECURITY PLUS POP QUIZ
This device monitors network traffic and can block malicious activity based on predefined rules.
What is a Firewall?
SECURITY PLUS POP QUIZ
This type of malware disguised itself as a legitimate software but performs malicious actions once installed.
What is a trojan horse?
SECURITY PLUS POP QUIZ
This security concept uses a mathematical process to transform readable data into an unreadable format, requiring a key to reverse the process.
What is encryption?
This marking shows that information should not be shared with foreign nationals.
What is NOFORN?
This document records access to a classified storage container.
What is SF-702?
This is the term for an event that could potentially cause the unauthorized disclosure of classified information.
What is a security violation?
This type of access requires both a clearance and formal indoctrination into a specific program.
What is Special Access Program (SAP)?
This agreement outlines the responsibilities of a cleared contractor to protect classified information.
What is DD Form 254?
This is the entity who determines the initial classification of information.
Who is the Original Classification Authority (OCA)?
This is the name of the regulation the NISPOM is codified under.
What is 32 CFR Part 117?
This attack exploits a vulnerability that is unknown to developers, so no patches are available.
What is a Zero-Day attack?
This system is used for submitting and managing clearance investigations.
What is NBIS?
This protocol is used to securely transmit web traffic over the internet using encryption.
What is HTTPS?
This concept determines classification based on combining pieces of information.
What is classification by compilation?
The required alarm system type for certain facilities that handle classified information.
What is an Intrusion Detection System (IDS)?
This doctrine emphasizes continuous evaluation of cleared personnel rather than periodic reinvestigations.
What is Continuous Vetting (CV)?