Security Clearance and Access
Forms and Documentation
Classification and Marking
Physical Security and Safeguarding
Insider Threat and Reporting
100

This level of clearance is the lowest of the three main national security classifications

What is confidential?

100

This form is used to request a background investigation for a security clearance.

What is SF-86?

100

This marking indicates information that is unclassified but still requires protection.

What is CUI?

100

This type of container is commonly used to store classified documents.

What is a GSA-approved safe?

100

This program is designed to detect and prevent threats from individuals within an organization.

What is an Insider Threat Program?

200

This principle describes individuals only being given access to information necessary for their job.

What is Need-to-Know?

200

This system replaced JPAS and is now used to manage personnel security records.

What is DISS?

200

SECURITY PLUS POP QUIZ

This type of attack involves overwhelming a system with traffic to make it unavailable.

What is a Denial-of-Service attack?

200

SECURITY PLUS POP QUIZ

This security concept ensure that data has not been altered or tampered with.

What is integrity?

200

SECURITY PLUS POP QUIZ

This device monitors network traffic and can block malicious activity based on predefined rules.

What is a Firewall?

300

SECURITY PLUS POP QUIZ

This type of malware disguised itself as a legitimate software but performs malicious actions once installed.

What is a trojan horse?

300

SECURITY PLUS POP QUIZ

This security concept uses a mathematical process to transform readable data into an unreadable format, requiring a key to reverse the process.

What is encryption?

300

This marking shows that information should not be shared with foreign nationals.

What is NOFORN?

300

This document records access to a classified storage container.

What is SF-702?

300

This is the term for an event that could potentially cause the unauthorized disclosure of classified information.

What is a security violation?

400

This type of access requires both a clearance and formal indoctrination into a specific program.

What is Special Access Program (SAP)?

400

This agreement outlines the responsibilities of a cleared contractor to protect classified information.

What is DD Form 254?

400

This is the entity who determines the initial classification of information.

Who is the Original Classification Authority (OCA)?

400

This is the name of the regulation the NISPOM is codified under.

What is 32 CFR Part 117?

400

This attack exploits a vulnerability that is unknown to developers, so no patches are available.

What is a Zero-Day attack?

500

This system is used for submitting and managing clearance investigations.

What is NBIS?

500

This protocol is used to securely transmit web traffic over the internet using encryption.

What is HTTPS?

500

This concept determines classification based on combining pieces of information.

What is classification by compilation?

500

The required alarm system type for certain facilities that handle classified information.

What is an Intrusion Detection System (IDS)?

500

This doctrine emphasizes continuous evaluation of cleared personnel rather than periodic reinvestigations.

What is Continuous Vetting (CV)?

M
e
n
u