Siprnet security annual refresher training (1 hr) (fouo) quizlet

SIPRNET ANSWERS PRETESTWhich if the following methods is not authorized for destroying classified informationOverlayingCyber commands are large, capable, and powerful organizations, but our collective security really begins with what?Your personal vigilance, attention, and adherence to our security standards and proceduresWho maintains the security clearance access roster for the commandThe command security managerYou are authorized to share your token pin with other personnel since it's not a passwordFAnnual siprnet security refresher training is conducted solely to eliminate minor security violationsF

What does siprnet stand forSecret internet protocol networkWhat army regulation contains both the army policy for handling the unauthorised disclosure of classified information and other security incidents, and general guidance or "how to" for commanders?AR 380-5Which if the following statements are true concerning protecting classified information in the workplaceWork materials such as drafts and worksheetsIf you are an officer, senior non commissioned officer, senior army civilianFalseWhat is the form number for the courier identification card that is used to identify personnel that are authorized to carry classified military informationDD-2501WHY do we conduct siprnet annual trainingall EXCEPT required by army/dod policyWhat is the secret internet protocol router network?A secure encrypted network authorized to process classified military information (CMI) up to, and including U.S. SecretCMI is the acronym for categorized military informationFWhich of the following choices represent common SIPRNET-related security violationsAll of the aboveThe person appointed to conduct the preliminary inquiry should not have been previously involved, directly or indirectly, in the incident and must have the appropriate security clearance.TSiprnet tokens contain three individual public key infrastructure certificates. The certificates are used for all of the following actions except what?Gaining access through an entry control pointWhat is the data transfer across security domains known as?SpillageA siprnet user must have which of the following requirements prior to accessing the siprnet system?All of the aboveSiprnet removable hard drives may be stored in a fireproof, keyed file cabinet

F