click below
click below
Normal Size Small Size show me how
PDG
USAF Chapter 19 - Security
Question | Answer |
---|---|
In the Air Force, security applies to | all members of the Air Force at all times |
Information Assurance is the responsibility of | everyone |
In the Air Force, Information Assurance is the responsibility of everyone. Information Assurance is defined as | measures that protect and defend information and information systems by ensuring their availability, integrity, confidentiality, authentication, and nonrepudiation |
The Air Force implements the Information Assurance Program to secure its information and information technology (IT) assets. The Air Force achieves this by using three core information assurance disciplines: | communications security (COMSEC), computer security (COMPUSEC), and emissions security (EMSEC) |
The Air Force Information Assurance Program is comprised of three programs: Communications Security (COMSEC), Computer Security (COMPUSEC), and Emissions Security (EMSEC). COMPUSEC consists of | measures that protect hardware, software, firmware, and information being processed, stored, and communicated |
Any telecomm or computer-related equipment or interconnected system or subsystems of equipment used in the acquisition, storage, manipulation, management, movement, control, display, transmission, or reception of voice or data and includes software, firmw | information system |
An action, device, procedure, technique, or other measure that reduces a vulnerability to an acceptable and manageable level (mitigating the overall threat). | countermeasure |
Adversaries increasingly rely on unconventional tactics to offset our superiority in conventional forces and technology. What activities pose the greatest threats to communications and information systems? | Information Operations (IO) and Information Warfare (IW |
The Air Force protects information systems from malicious logic (virus, worm, Trojan horse, and Botnets) attacks by applying an appropriate mix of preventive measures to include | all of these answers |
The Air Force Information Assurance Program is comprised of three programs: Communications Security (COMSEC), Computer Security (COMPUSEC), and Emissions Security (EMSEC). COMSEC consists of | measures that deny access to information by unauthorized persons and ensure its authenticity |
The Air Force Information Assurance program is comprised of three programs: Communications Security (COMSEC), Computer Security (COMPUSEC), and Emissions Security (EMSEC). COMSEC itself is comprised of three programs: | Cryptosecurity, Transmission Security, and Physical Security |
The Communications Security (COMSEC) program is comprised of three components: Cryptosecurity, Transmission Security, and Physical Security. Cryptosecurity is a component that | focuses on the provision and proper use of technically sound cryptosystems |
The Communications Security (COMSEC) program is comprised of three components: Cryptosecurity, Transmission Security, and Physical Security. Transmission Security is a component that | protects transmissions from interception and exploitation by means other than cryptoanalysis |
The Communications Security (COMSEC) program is comprised of three components: Cryptosecurity, Transmission Security, and Physical Security. Physical Security is a component that | uses all physical measures necessary to safeguard COMSEC material from access by unauthorized persons |
The Air Force Information Assurance Program is comprised of three elements: Communications Security (COMSEC), Computer Security (COMPUSEC), and Emissions Security (EMSEC). Emissions Security consists of | measures that deny access to information through interception and analysis of compromising emanations |
The process of identifying, analyzing, and controlling critical information indicating friendly actions associated with military operations and other activities is | Operations Security (OPSEC) |
The purpose of Operations Security (OPSEC) is | to reduce the vulnerability of Air Force missions by preventing adversary collection and exploitation of critical information |
Air Force forces can be under observation at their peacetime bases and locations, in training or exercises, while moving, or when deployed to the field conducting actual operations. Therefore, OPSEC principles must be integrated into | all of these answers |
OPSEC should be incorporated into day-to-day activities to ensure a seamless transition to contingency operations. The OPSEC process consists of five distinct steps: | identify critical information, analyze threats, analyze vulnerabilities, assess risk, and apply appropriate OPSEC measures |
Sources of OPSEC indicators are | friendly, detectable actions, and open-source information that can be pieced together by an adversary to derive critical information |
OPSEC indicators have five basic characteristics that make them potentially valuable to an adversary: | Signatures, Associations, Profiles, Contrasts, and Exposure |
OPSEC indicators have five basic characteristics: Signatures, Associations, Profiles, Contrasts, and Exposure. Signatures refers to | the characteristic of an indicator that makes it identifiable or causes it to stand out |
OPSEC indicators have five basic characteristics: Signatures, Associations, Profiles, Contrasts, and Exposure. Associations refers to | the relationship of an indicator to other information or activities |
OPSEC indicators have five basic characteristics: Signatures, Associations, Profiles, Contrasts, and Exposure. Profiles are defined as | how each activity has its own set of unique signatures and associations |
OPSEC indicators have five basic characteristics: Signatures, Associations, Profiles, Contrasts, and Exposure. Contrasts are | any difference observed between an activity’s standard profile and its recent or current actions |
OPSEC indicators have five basic characteristics: Signatures, Associations, Profiles, Contrasts, and Exposure. Exposure is | when and for how long an indicator is observed |
The Air Force policy to identify, classify, downgrade, declassify, mark, protect, and destroy its classified information and material consistent with national policy is known as | Information Security (INFOSEC) |
The initial decision an item of information could cause damage to the nat secur if subject to unautho disclosure, and the interests of the nat sec are best served by applying the safeguards of the Information Security Program to protect it is known as | Original Classification |
The decision that an item of information could damage national security if subject to unauthorized disclosure is known as original classification. The decision to classify information may only be made by persons who | all of these answers |
A Security Classification Guide (SCG) identifies specific items or categories of information for each system, program, plan, or project requiring classification. The SCG identifies | all of these answers |
Derivative classification is the | application of classification markings to a document as directed by a Security Classification Guide or other source material |
Every classified document must be marked | to show the highest classification of information it contains |
Every classified document must be marked to show the highest classification of information it contains. The overall classification will be marked, stamped, or affixed on | the front cover, the title page, the first page, and the outside of the back cover |
Every classified document must show the agency, office of origin, and date of origin on | the first page, title page, or front cover |
Information must be declassified | as soon as it no longer meets the standards for classification |
Information must be declassified as soon as it no longer meets the standards for classification. There are 4 separate systems that can bring about the declassification of information: | all of these answers |
If reason exists to indicate a document has been classified improperly or unnecessarily, personnel should submit challenges of classification to | the security manager or the classifier of the information |
Classified information must be protected at all times by either of two methods | A. storing it in an approved device or facility B. having it under the personal observation and control of an authorized individual both A and B |
Heads of activities that process or store classified information must establish a system of security checks at the close of each working day to ensure the area is secure. What form is used to record these checks? | SF 701, Activity Security Checklist |
A person may not have access to classified information unless determined to have the proper security clearance and | the need to know |
No one may have access to classified information without the proper security clearance and need to know. The responsibility for determining if a person has the proper security clearance and requires access to classified information rests with | the individual authorized possession, knowledge, or control of the information |
Classified information at the Top Secret level is controlled and accounted for through | top secret control account systems |
Classified information at the Secret level is controlled and accounted for through | internal controls as determined by unit commanders or staff agency chiefs |
Confidential information is controlled and accounted for through | routine administrative procedures |
Material classified at this level does not require a receipt when transferring the material either through the mail or in person. | confidential |
DoD military and civilian personnel are subject to sanctions if they knowingly, willfully, or negligently disclose classified information to unauthorized persons. Sanctions include, but are not limited to | A. warning, reprimand, suspension without pay and forfeiture of pay B. removal, discharge, and loss of access to classified information C. action under the UCMJ and under applicable criminal law *D. all of these answers |
The Personnel Security Program involves | determining the trustworthiness of individuals before they have access to classified information |
The Personnel Security program requires commanders and supervisors to continually observe their subordinates' behavior. If warranted, the commander forwards unfavorable information to the _____________ for adjudication. | Air Force Central Adjudication Facility |
Personnel security clearances are recorded in the | Joint Personnel Adjudication System (JPAS) |
The Industrial Security Program involves | identifying information in classified contracts that must be protected while entrusted to industry |
The Air Force Integrated Defense (ID) Program employs active and passive, as well as offensive and defensive, multidisciplinary capabilities to | mitigate potential risks and defeat adversary threats to Air Force operations |
The Air Force Integrated Defense (ID) Program ensures all Airmen are trained to | defend themselves and integrate into defense operations |
Installation commanders determine Integrated Defense (ID) requirements based on a four-step process: (1) Determining and prioritizing the criticality of installation assets, (2) Analyzing the threats and operating environment, and | Assessing installation vulnerabilities, and (4) Making ID decisions |
The Air Force Integrated Defense (ID) Program is an “all-Airmen” program. However, _____________ have enterprise lead in ID operations. | Air Force Security Forces |
The goal of the Air Force Integrated Defense (ID) program is to | neutralize security threats throughout the base boundary (BB) to ensure unhindered Air Force operations |
The Integrated Defense (ID) program does not stand alone in protecting personnel and resources. The protection and defense of air bases requires the coordinated effort of | A. Emergency Management (EM) B. Antiterrorism (AT) C. other forces under the Force Protection (FP) umbrella *D. all of these answers |
Joint Publications define the base boundary (BB) as a line that delineates the surface area of a base. Which of the following statements about the BB is true? | The Base Boundary is not necessarily the base perimeter. |
The Base Security Zone (BSZ) is an Air Force unique concept and term. The Air Force uses the term to describe the area of concern around an air base and to | support the establishment and adjustment of the Base Boundary |
The ______________ is the area outside the base perimeter from which the base may be vulnerable from standoff threats such as mortars or rockets. | Base Security Zone (BSZ) |
The command and control center for Integrated Defense (ID) operations during routine and emergency operations is | the Base Defense Operations Center (BDOC |
This is an action group whereby the sec for staff S-2 function coordinates with subject matter experts (SME) from the Intelligence and AFOSI communities to collaborate and conduct intelligence preparation of the operational environment (IPOE). | the Intelligence Fusion Cell (IFC) |
An analytical methodology which is a continuous, four-part process that: (1) defines the operating environment, (2) describes the operating environment’s effects, (3) evaluates the enemy, and (4) determines enemy course of action. | Intelligence Preparation of the Operational Environment (IPOE) |
Intelligence Preparation of the Operational Environment (IPOE) is a continuous, four-part process. Which part involves comprehensive lists of tasked forces, terrain and weather, and background data on the operating environment? | define the operating environment |
Intelligence Preparation of the Operational Environment (IPOE) is a continuous, four-part process. Which part involves analyzing the data collected in Part 1 and describing how the factors affect operations, equipment, and personnel? | describe the operating environment’s effects |
Intelligence Preparation of the Operational Environment (IPOE) is a continuous, four-part process. Which part involves making logical predictions of Enemy Course of Action? | determine Enemy Course of Action (ECOA) |
This func provides instal comm, integrated defense working groups, defense force comman, and defense planners the ability to produce effects-based, integrated defense plans by using a standar model to identify risks and develop risk management strategies. | Integrated Defense Risk Management Process (IDRMP) |
The Integrated Defense Risk Management Process (IDRMP) has four main components: (1) the risk assessment, (2) the risk tolerance decision, (3) course of action determination, and | decision and implementation |
Although the Integrated Defense Risk Management Process has four main components, they are accomplished in 7 steps. Step 4, Develop the Risk Assessment, states that a quantitative measurement of risk can be determined using the following equation: | risk = asset criticality multiplied by (threat multiplied by vulnerability) |
There are four Security Protection levels. Protection Level 1 (PL1) is assigned to those resources for which the loss, theft, destruction, misuse, or compromise would | result in great harm to the strategic capability of the United States |
Protection Level 1 (PL1) is assigned to those resources for which the loss, theft, destruction, misuse, or compromise would result in great harm to the strategic capability of the United States. Examples of PL1 resources are | A. nuclear weapons in storage, mated to a delivery system or in transit B. designated command, control, and communications (C3) facilities C. aircraft designated to transport the President of the United States *D. all of these answers |
There are four Security Protection levels. Protection Level 2 (PL2) is assigned to resources for which the loss, theft, destruction, misuse, or compromise would | cause significant harm to the war-fighting capability of the United States |
Protection Level 2 (PL2) is assigned to resources for which the loss, theft, destruction, misuse, or compromise would cause significant harm to the war-fighting capability of the United States. Examples of PL2 resources are | A. nonnuclear alert forces and designated space and launch systems B. expensive, few in number, or one-of-a-kind systems or facilities C. intelligence-gathering systems *D. all of these answers |
Protection Level 3 (PL3) is assigned to resources for which the loss, theft, destruction, misuse, or compromise would | damage United States war-fighting capability |
Protection Level 3 (PL3) is assigned to resources for which the loss, theft, destruction, misuse, or compromise would damage United States war-fighting capability. Examples of PL3 resources are | selected C3 facilities, systems, and equipment |
The lowest protection level is Protection Level 4 (PL4) which is assigned to resources that do not meet the definitions of PL1, PL2, or PL3 resources, but for which the loss, theft, destruction, misuse, or compromise would | adversely affect the operational capability of the Air Force |
This program seeks to deter or limit the effects of terrorist acts by giving guidance on collecting and disseminating timely threat infor, providing training, developing plans to deter terrorist incidents, and implementing antiterrorism measures. | Air Force Antiterrorism Program |
The first step in developing an effective antiterrorism program is | identifying the potential terrorism threat to DoD personnel and assets |
At a strat level, who is responsible for ensuring the timely colle proc, analysis, prod, and dissemin of foreign intel, current intel, and national-level intel infor concerning terrorist activities, terrorist org, and force protection issues? | the Deputy Chief of Staff for Intelligence, Surveillance and Reconnaissance (HQ USAF/A2) |
The _______________ is the lead Air Force agency for the collection, investigation, analysis, and response to threats arising from terrorists, criminal activity, and foreign intelligence and security services. | Air Force Office of Special Investigations (AFOSI) |
The AFOSI is the lead Air Force agency for collection, investigation, analysis, and response for threats arising from terrorists, criminal activity and foreign intelligence and is primarily focused on | countering adversary intelligence collection activities against U.S. forces |
What program provides random, multiple security measures that consistently change the look of an installation's anti-terrorism program to defeat surveillance attempts and make it difficult for a terrorist to accurately predict our actions? | DOD Random Antiterrorism Measures (RAM) Program |
When traveling overseas, members should | A. travel in small groups B. try to be inconspicuous when using public transportation C. adopt the dress, conduct, and mannerisms of the people in the area *D. all of these answers |
Criminal and terrorist acts against individuals usually occur outside the home. Your most predictable habit is | the route you travel from home to your place of duty or to commonly frequented local facilities |
Before traveling overseas, consult _____________ to ensure you know and can meet all requirements for travel to a particular country | DoD 4500.54-G, DoD Foreign Clearance Guide |
Before traveling overseas, get an area of responsibility specific threat briefing from your security officer, ATO, or appropriate counterintelligence or security organization. This briefing must occur | within 3 months of travel |
_____________ is the intelligence derived from the intelligence collection discipline that uses human beings as both source and collectors and where the human being is the primary collection instrument. | Human Resources Intelligence or HUMINT |
Information gathered and activities conducted to protect against espionage, sabotage, or assassinations conducted by or on behalf of foreign governments, foreign organizations or foreign persons, or international terrorist activities is | Counterintelligence (CI) |
The act of obtaining, delivering, transmitting, communicating, or receiving infor about the national defense with intent or reason to believe the info may be used to the injury of the US or to the advantage of any foreign nation is known as | Espionage |
Any action designed to undermine the military, economic, psychological, or political strength or morale of a regime is known as | Subversion |
An act or acts with intent to injure, interfere with, or obstruct the nat defense of a country by willfully injuring or destroy, or attemp to injure or destroy, any nat defense or war mate, premises, or utilities, to include human and natural resources is | Sabotage |
The calculated use of unlawful violence or threat of unlawful violence to inculcate fear; intended to coerce or intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological is | terrorism |
The Human Resources Intelligence or HUMINT effort consists of three primary functions | interrogation, source operations, and debriefing |
The systematic effort to procure information to answer specific collection requirements by direct and indirect questioning techniques of a person who is in the custody of the forces conducting the questioning is | Interrogation |
Source Operations refers to how trained military HUMINT collection personnel may develop information through the elicitation of sources including | A. “walk-in” sources, who without solicit make the first contact with HUMINT pers B. dev sources that are met over a period of time and provide info, based on oper requi C. unwitting persons, with access to sensitive infor *D. all of these answers |
The process of questioning cooperating human sources to satisfy intelligence requirements, consistent with applicable law, is known as | debriefing |
What operation is not a primary HUMINT function and exploits captured documents and media? | Document and Media Exploitation |
AFI 71-101, Volume 4, Counterintelligence, requires individuals who have reportable contacts or acquire reportable information to report the contact or information, either verbally or in writing, to AFOSI within | 30 days of the contact |
AFI 71-101, Volume 4, Counterintelligence, requires individuals who have reportable contacts or acquire reportable information to report the contact or information within 30 days of the contact. “Contact” means | A. any exchange of information B. solicited or unsolicited telephone calls C. email, radio contact, and face-to-face meetings *D. all of these answers |
The AFOSI conducts all counterintelligence investigations, operations, collections, and other related activities for the Air Force. In the United States, the AFOSI coordinates these activities with | the Federal Bureau of Investigation (FBI) |
The AFOSI conducts all counterintelligence investigations, operations, collections, and other related activities for the Air Force. Outside the United States, the AFOSI coordinates these activities with | the Central Intelligence Agency and the FBI |
What agency is the installation-level training agency for counterintelligence (CI) awareness briefings and is the sole Air Force repository for the collection and retention of reportable information? | the AFOSI the AFOSI |
Air Force members and employees must notify their commanders, supervisors, or the AFOSI of information concerning the safety of anyone under the protection of the United States Secret Service. This includes | A. the President and Vice President B. the President- and Vice President-elect C. any foreign head of state visiting the United States *D. all of these answers |
A formal agreement between the DoD and U.S. Secret Service requires military members to report information to the Secret Service pertaining to the protect of the President. The ______ is the point of contact between the Air Force and the Secret Service. | the AFOSI |