The security of classified military information is not only a command responsibility of which of the following personnel?
All of the Above
Who maintains the security clearance access roster for the command?
The Command Security Manager
Which of the following actions are prohibited by Army Regulation 25-2, Information Assurance?
Storing and or using cellular telephones or other wireless devices where classified process takes place
If you are an officer, senior noncommissioned officer, senior Army civilian, or senior foreign national, it is possible that you may be appointed to conduct a preliminary inquiry of possible loss or compromise of classified information.
False
Why do we conduct SIPRNET annual training? Choose each applicable answer.
We desire to eliminate and minimize minor security violations within MEDCOM
We are required to do so by MEDCOM policy
There are real and growing threats to the Army MEDCOM in the cyber domain conflict.
The Cyber Commands are large, capable, and powerful organizations, but our collective security really begins with what?
Your personal vigilance, attention, and adherence to our security standards and procedures
SIPRNET token contain three individual public key infrastructure certificates. These certificates are used for all of the following actions EXCEPT what?
Gaining access through an entry control point
SIPRNET removable hard drives may be stored in a fireproof, keyed file cabinet.
False
The local information Assurance Support Officer is responsible for which of the following actions?
All of the above
Which of the following statements are true concerning information storage requirements?
A GSA approved security container is authorized for storage of Secret documents.
A member of the operations office has been handed a Secret document that he needs for his work. What is he responsible for as a custodian of that document?
Ensuring that the document is locked in a GSA approved security container whenever it is not in use or under the direct supervision of an authorized person.
When an incident of possible loss or compromise of classified information is reported, who does Army policy require to immediately initiate a preliminary inquiry with the focus on answering when, where, and how did the incident occur?
The Commander
Because we use "Secret" level encryption devices and keys, the SIPRNET is completely and totally secure and can be used to transmit the most secure and sensitive information that we have in the Army and Department of Defense.
False
The purpose of this annual SIPRNET refresher training is to ensure that all MEDCOM SIPRNET users are aware of their responsibilities for the protection of classified data and systems in accordance with applicable Army regulations and MEDCOM policy on SIPRNET Security Procedures.
True
Which of the following statements concerning the hand-carrying of classified material is NOT correct?
The classified materials can be read or studied in public, however, the proper cover sheet (SF-703, 704 or 705) must be used.
Which of the following choices is NOT one of the four distinct areas of potential threat against MEDCOM and the MEDCOM SIPRNET communications backbone?
Official correspondences between MEDCOM and other authorized entities for official government business.
SIPRNET token PINS can consist of both numbers and letters.
False
Which of the following choices represent common SIPRNET-related security violations?
All of the above
Top Secret operational and intelligence communications are integrated into what communications backbone?
JWICS
What Army regulation contains both the Army policy for handling the unauthorized disclosure of classification document and other security incidents, and general guidance or "how to" for commanders?
AR 380-5, Department of the Army Information Security Program