General Security
InduSec
InfoSec
PerSec
PhySec
100

Security Violations, Espionage, Workplace Violence, Unauthorized Disclosures and Unwitting actions that increase vulnerabilities are examples of this.

What is Insider Threat?

100

This form is called a Contract Security Classification Specification.

What is a DD Form 254?

100

What Standard is used for safeguarding Secret Classification.

What is three SF 704?


100

This system of verification has replaced JPAS.

What is DISS?

100

This instruction governs the DoD Physical Security Program.

What is DoD Instruction 5200.08?

200

This Standard form has to be signed before someone is granted access to classified information.

What is SF 312?

200

DOD representative responsible for managing contractors.

What is the COR?


200

Incorporating, paraphrasing, restating, or generating in new form information that is already classified, and marking the newly developed material consistent with the classification markings that apply to the source information.

What is a Derivative Classification?

200


This eligibility can be granted with:

1. Proof of citizenship

2. Favorable FBI, SF86 and local files review

3. Open investigation

What is interim?

200

A situation or circumstance, which left unchanged, may result in the degradation, loss of life, or damage to mission-essential resources.

What is a vulnerability?

300

This type of unclassified information has replaced other classifications ie. FOUO

What is CUI?

(Controlled Unclassified Information)

300

Minimum access needed for a contractor access to the network.

What is Tier 1?

300

Any knowing, willful, or negligent action that could reasonably be expected to result in an unauthorized disclosure of classified information. 

What is a violation?

300

A periodic review of the an individual’s background to determine whether they continue to meet the requirements for national security eligibility.

What is Continuous Evaluation?

300


Layered and complimentary security controls sufficient to deter, detect, and document unauthorized entry and movement within the facility or area. 

What is Security-in-Depth?

400

The acronym is FOIA.

What is Freedom of information Act?

400

True or False

A contractor can have access to Fort Hood without having a Common access card.

What is a true?

400

Individual appointed by the Commander to oversea the Information program.

Who is the Security Manager?


400


SEAD 4 contains thirteen of these for eligibility guidance for access to classified information.


What are the Nation Security Adjudicative Guidelines?

400


These are used to reduce patterns, change schedules, and visibly increase the security profile of an installation

What are random antiterrorism measures?

500

There are this many federal investigative standard tiers.

What is 5?

500

This person must always approve an SCI contract on the DD Form 254.

Who is the SSO?

Special Security Officer

500

Security incident that occurs whenever classified data is misused on an unclassified information system

What is Spillage?

500

All personnel with national security eligibility will be given initial and an annual refresher of this.

What is security training?

500


A place (land, sea or air) in which there are special measures employed to prevent or minimize incursions and/or interference, where special security measures are employed to prevent unauthorized entry

What is a restricted area?